klondike

Although klondike had always had the curiosity inherent to hackers to take apart things to see how they worked and even fix them and learned how to use MS-DOS with 7 years so he could play Commander Queen on his father’s computer things looked as if he was just going to be a computer programmer. But, after spending a summer reading Bruce Schneier’s applied cryptography and taking part, after lots of persuasion by the organizers, on a CTF competition where he wrote his own tools things started escalating quickly.

Since then klondike has done things like participating in some CTFs, becoming a Gentoo Hardened developer, writing an Arduino bootloader able to cryptographically verify updates, contributed cryptographic code to the Haskell community, written a fast implementation of the TTH algorithm and championed the introduction of new standards in the ADC protocol.

Currently, klondike works as a pentester and in house developer at a security company where he also supports other workers in cryptographic matters whilst trying to do his research in his spare time.


URLs for klondike

No URLs found.


Events for klondike

Gentoo Hardened is a GNU/Linux distribution focused on making attacks harder to succeed.

In this talk we will cover the different ways in which Gentoo Hardened allows you to reduce or mitigate the risk of known attacks techniques and will also explain how other techniques can be used to mitigate the impact after an attacker carries out a successful exploit.

Finally we will cover how a simple Gentoo Hardened install differs from a normal Gentoo install and explain what is the cu… Read more


Schedule:

  • Wednesday, Aug 23rd, 2017, 17:30 (CEST) - Wednesday, Aug 23rd, 2017, 18:30 (CEST)

Do you have an interest in computer or network security but you need help establishing grounds? Or you feel like a pro h4x0r that could teach over 9000 newbies? Come in, ask questions give answers and learn!

#NetworkSecurity #Training

The open CYBERtable is intended as a lightly moderated meeting to pass on knowledge to the next generation of hackers. The activity consists on sitting around in a circle like shape so that all can see all and keep a distended talk about security … Read more


Schedule:

  • Monday, Aug 28th, 2017, 16:30 (CEST) - Monday, Aug 28th, 2017, 17:30 (CEST)