fbpx

Edward Snowden Secret Talk with Tech Experts at SXSW

NSA whistleblower Edward Snowden came up via video call at the SXSW festival in Austin, Texas, on Sunday morning. Snowden held a streamed question-and-answer session with a group of invited privacy campaigners and technology experts.

Edward Snowden cannot attend tech conferences in person because he may be arrested if he leaves Russia. Sunday Yokubaitis, president of online privacy company Golden Frog, described as a “call to arms” that came in the form of a question and answer session.



The meeting was attended by Yokubaitis along with Cloudflare CEO Matthew Prince, Twitter senior product counsel Matthew Zimmerman, and Evernote CEO Phil Libin, and others.

As reported by Yokubaitis, Snowden said that companies need to adopt more secure technology that could brick surveillance in a mass or make it too stiff to pursue en masse. A major focus was end-to-end encryption, which means that the contents of communications would be visible to only the sender and the recipient. No third party can have access to the content which is being communicated.

“The low-hanging fruit is always [the] transit layer,” Edward reported. “It raises the cost. Every time we raise the cost, we force budgetary constraints.” This is especially relevant as tools that are built for targeted steadily grow into broader programs. “We hope that they start with North Korea and by the time they end up in Ohio, they run out of budget.”

Edward Snowden described that security systems like SSL are critical infrastructure because enough investment has not been made on these systems and as a result they have been subject to vulnerabilities. He further elaborated that if encryption is not common, simply using will mark a message as suspicious. Therefore companies should work for better encryptions.

“Him saying validates that companies should try and fill the holes, and not wait for policy,” said Yokubaitis after the meeting.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...