Technosolutionism and human rights
09:15 - 09:40
Governments around the globe accept technology as a one-stop-shop solution promising the future socially, economically... nothing that can't be improved or solved with a tech unicorn! But what are the costs that come with embracing technology as the solution to every analogue issue? The COVID19 crisis has laid bare the challenges of public trust, confidence and expectations that individuals have of technology. In this session we will look at how a perfectly tailored technical solution can impact individual's rights and liberties; and discuss the design parameters to mitigate such impacts.
Cracking open the COVIDSafe
09:50 - 10:15
What exactly is contact tracing, and how can Bluetooth help to slow the spread of a pandemic? How can I balance my own privacy with communal health? Can a simple app actually make it safe to go back to the football?
10:25 - 11:20
Carina C. Zona
Biometrics are widely regarded by the public, and many developers, as heightened security. Their actual track record tells a very different story. Biometric technologies are systematically making the world a less safe place. We have an obligation to do something about that. And we can.
What We Do in the Shadows
12:45 - 13:10
This talk delves into the psychology of shadow IT, the opportunities that can grow out of the corporate underground, and how to get these systems out of the shadows and into the light.
Deceptive Security using Python
13:20 - 13:45
Imagine you are passing through an unknown street at midnight and you find that some anti-social elements are following you. To save yourself from them you start running and look for a safe place to hide yourself. On the way, you will find a good person and request the person to help you. The person hides you in the secure place to protect you. When these anti-social elements visit a good person’s place and enquire about you, the good person misguides them and redirects them to some other place in order to protect you. This is exactly how deception works. In this analogy, YOU are the resources to be protected, anti-social elements are the hackers who want to gain access to the resources, and a good person is a deception technique that protects the resources from hackers by making them fall in the trap.
Hacking Playable Ads: What REALLY are they?
13:55 - 14:20
Have you ever clicked the 💎 FREE GEMS 💎 button and been served an ad, only to find you're now trialing a game? Come along and learn what those ads really are (and how we can use Python to remove them, all while still keeping your precious gems! 💎😉 )
All Hands on Deck – Handling Security Issues
14:30 - 14:45
We live in a world of technology. Unfortunately, the software we build has bugs and sometimes vulnerabilities that cause headaches and haunt us at night. It is on us as engineers to not make security issues in the first place. But it is on everybody involved to provide support when an issue exists.
*All times are shown in Australian Central Standard Time (UTC+09:30)