Brussels / 3 & 4 February 2018

schedule

Using Cryptographic Hardware


This presentation explains how cryptographic hardware allows the use of private keys while preventing them from being viewed or copied. It focuses primarily on the use of Yubikey cryptographic hardware, in both piv and gpg modes. It explains how to use this hardware with popular software like openssh and Postgres.

Speakers

Photo of Bruce Momjian Bruce Momjian

Links