Anti-RSA TrustyCon draws packed house seeking modern security know-how
Disgusted by the possibility that RSA took $10 million in NSA money to use a deliberately flawed encryption algorithm, a small contingent of folks originally slated to appear at the 2014 RSA Conference decamped and staged their own security-themed get-together: TrustyCon.
The conference's stated mission: "[to] prioritize and refocus trust in technology and technology companies during a time of cynicism and contempt towards consumer security and privacy." Based on the first year's roster of events and speakers, there's at least as much emphasis on the politics as on the technology itself. That's no surprise given how one of TrustyCon's supporters is the Electronic Frontier Foundation, never shy to speak out about the political implications of any technology.
Though small -- only 400 seats to RSA's 25,000 -- the entire event, held in the AMC Metreon multiplex across the street from the Moscone Center -- sold out in three days, with tickets going for $50 each. In fact, according to the Register, 300 additional people were waitlisted for the show but couldn't get in, a good sign that curiosity about the show and demand for its roster of speakers was running high. For those who couldn't make it, a live stream of the event has been archived on YouTube.
The exodus from the RSA show, and to TrustyCon, began when Finnish security firm F-Secure's CTO Mikko Hyppönen declared he was canceling his talk at RSA (the conference) over the NSA flap, for which he's publicly lambasted RSA (the company). Hyppönen's talk at TrustyCon was entitled "The Talk I Was Going to Give at RSA," and in it he warned that the destruction of trust in companies like RSA or even his own F-Secure, due to under-the-table collusions or lack of transparency, would ruin the security industry as a whole.
http://www.infoworld.com/t/security/anti-rsa-trustycon-draws-packed-house-seeking-modern-security-know-how-237427
Mikko Hyppönen has also speculated that some anti-virus security software vendors have "white-listed" government exploits, rather than detecting and removing them.