A lot happend since ToxCon 2017 last year. c-toxcore fixes were applied, A/V issues were fixed and many other interesting things which we will try to summarize
The talk explains the basic concepts of cryptography. For each class of function the most commonly used algorithm is presented alongside with implementation samples in various programming languages with a special focus on common pitfalls.
Getting the last percent of performance by hand tuning C Code for the compiler
A short descriptive tail of a Developer finding Tox and creating an Android client by accident on the way
All publicly available password manager, propreitary and open source, share the same weakness when it comes to cloud-based synchronization: the cloud server holds sufficient information to allow offline cracking attack on the user's master password. This talk gives an overview on the cryptography used by popular password manager (e.g., Google SmartLock, 1Password, Firefox sync, Keepass), and proposes SpreadPass, an ongoing open source project that utilizes Password-Protected Secret Sharing (PPSS) to oppose the single point of risk architecture of standard solutions.
This talk gives an overview of the current state of tox-rs. Why we implemented it in Rust and why you should try it.
I will give an overview of metadata protection in Tox, and discuss the problems posed by Sybil attacks and potential solutions
Why is it important for Tox to use libre codecs and container formats for audio and video communications, and how is this implemented?
qTox, state of the art Tox client, current state and future developments