Skip to content
Keynote: Intelligent Interfaces: Challenges and Opportunities by Aaron Quigley
- Eye Tracking of the user
- DiffDisplays – Eye tracking and when you looked away from a screen it frooze it. When you looked back it gave you a summary/diff of what you missed
- Bought this down to the widget level, a widget got notification when user looking or away and could decide what to do
- Change Blindness (different from attention blindness)
- When phone far away simplify phone interface, more detail when closer
- People don’t see details of displays slowly fading in and out as distance from display changed
- Phone on table, screen up or screen down
- SpeCam – Facedown screen can have light and detect what it is sitting on. Guess material it is sitting on
- Accuracy same/better than a proper spectrometer
- MicroCam – Phone placed with screen face up
- Placement aware computing
- OmniSense
- 360 Camera
- Track what the user’s whole body is doing
- Tracks what is happening all around the user. Danger sensors, context aware output
- BreathIn control. Breath pattern to control phone
- User camera in a watch potion to detect handle gestures (looking at top/back of hand)
- RotoSwype – Smart ring to do gesture keyboard input
- RadarCat – Radar + Categorization
- More Socially acceptable that cameras everywhere and always on
- Used to detect material
- Complex pattern of reflection and absorption that returns lots of information
- Trained on 661 feature and 512 bins
- Radar signal can ever detect different colours. Different dyes interact differently
- Can detect if people are wearing gloves
- Application – Scales at self-checkout supermarket to detect what is being weighed
- Radar in shoe can recognise the surface and layers below (carpet on weed etc)
Passwordless Linux – Passkey and External IdP support in FreeIPA by Fraser Tweedale
- Passwords
- Users are diligent (weak reuse)
- Using passwords securely imposes friction and cognitive load
- Phishable
- Objectives – Reduce password picking risks, phishing, friction,frequency of login
- Alternatives
- 2FA, Smartcard, Passkeys / WebAuthn, Web SSO Providers
- 2FA
- HOTP / TOTP etc
- phishable
- Smart Cards
- Passkeys
- Better versions of MFA Cards
- Phishing resistant
- “passkey” term is a little vague
- Web SSO
- SAML, OAuth2
- Using an existing account to authenticate
- Some privacy concern
- Keycloak, Redhat SSO, Okta, Facebook
- Great on the web, harder in other context
- What about our workstations?
- pam has hooks for most of the above (Web SSO less common) or pam_sss does all
- FreeIPA / Red Hat Identity Management
- DEMO
Locknote: Who gets to work in STEM? And who is being left out? by Rae Johnston
- Poor diversity affects the development of AI
- False identification much higher by facial recognition for non-white people
- Feed the AI more data sets?
- Bias might not even be noticed if the developers are not diverse
- Only around 25% of STEM people are Women
- Only 15% of UK scientist came from Working Class backgrounds (35% of the population)
- 11% of Australians don’t have access to affordable Internet or don’t use it.
- The digital divide is narrowing but getting deeper. Increasing harder to function if you are not online
- Male STEM graduates are 1.8x more likely to be in jobs that required the array than women. Mush worse for indigenous people
Lightning Talks
- Creating test networks with Network Namespace
- Rerap Micron
- Haystack Storage System
- Time-bases key/value store
- AgOpenGPS
- Self Steering System for Tractors
- Common Network Myths
- End to end packet loss is the only thing that matters
- Single broadcast domain is a SPOF, broadcast storms etc
- Ping and ICMP is your friend. Please allow ping
- Don’t force 1500 MTU
- Asymmetric routing is normal
- non-standard port number doesn’t make you secure
- radio:console for remote radio
- WASM
- FileSender – Share large datasets over the Internet
Keynote: How Adversaries Use AI by Jana Dekanovska
- Adversary
- Nation States
- Ecrime
- Hactivism
- Trends
- High Profile Ecrime attacks – Ransomware -> Data extortion
- Malware-Free Attacks – Phish, Social engineering to get in rather than malware
- Cloud Consciousness
- Espionage – Focuses in Eastern Europe and Middle East
- Vulnerability Exploitation – Not just zero days, Takes while to learn to leverage vuls
- Cloud Consciousness – Adversary knows they are in the cloud, have to operate in it.
- Generative AI
- Code Generation
- Social Engineer – Help people sound like Native Speakers, improve wording
- Prompt Injection
- Big Four States sponsoring attacks – China, North Korea, Iran, Russia
- North Korea – Often after money
- Russia, Iran – Concentrating on local adversaries
- China
- 1m personal in Cyber Security
- Get as much data as possible
- Elections
- Won’t be hacking into voting systems
- Will be generating news, stories, content and targeting populations
- Crime Operations
- GenAI helps efficiency and Speed of attacks
- Average Breakout time faster from 10h in 2018 to 1h now
- Members from around the world, at leats one from Australia
- Using ChatGPT to help out during intrusions to understand what they are seeing
- Using ChatGPT to generate scripts
Consistent Eventually Replication Database by William Brown
- Sites go down. Lets have multiple sites for our database
- CAP Theorem
- PostgresSQL Database
- Active Primary + Standby
- Always Consistent
- Promote passive to active in event of outage
- Availability
- But not partition tolerant
- etcd
- Nodes elect active node which handles writes. Passive nodes go offline then others are still happy
- If active node fails then new active node elected and handles writes
- Not availbale. Since if only one node then it will go to sleep cause it doesn’t know state of other nodes (dead or just unreachable)
- Active Directory
- If node disconnected then it will just keep serving old data
- reads and writes always services even if they are out of contact with other nodes
- Not consistent
- Kanidm
- identity management database
- Want availability and partition tolerance
- Because we want disconnected nodes to still handle reads and writes (eg for branch office that is off internet)
- Also want to be able to scale very high, single node can’t handle all the writes
- Building and Design
- Simultaneous writes have to happen on multiple servers, what happens if writes overlap. Changes to same record on different servers
- ” What would Postgres do? “
- Have nanosecond timestamps. Apply events nicely in order, only worry about conflicts. Use Lamport Clock (which only goes forward)
- What happens if the timestamps match?
- Servers get a uuid, timestamp gets uuid added to it so one server is slightly newer
- Both servers can go though process in isolation and get the same outputted database content
- Lots more stuff but I got lost
- Most of your code will be doing weird paths. And they must all be tested.
- Complaint that academic papers are very hard to read. Difficult to translate into code.
Next Generation Authorisation – a developers guide to Cedar by Ricardo Sueiras
- Authorisation is hard
- Ceder
- DSL around authorisation
- Policy Language
- Evaluation and Authorisation Engine
- Easy to Analise
- Authorisation Language
Managing the Madness of Cloud Logging by Alistair Chapman
- The use case
- All vendors put their logs in weird places and in weird sorts of ways. All differently
- Different defaults for different events
- Inconsistent event formats –
- Changes must be proactive – You have to turn on before you need it
- Configuration isn’t static – VEndor can change around the format with little worning
- Very easy to access the platform APIs from a VM.
- Easy to get on a VM if you have access to the Cloud platform
- Platform Security Tools
- Has access to all logs and can correlate events
- Doesn’t work well if you are not 100% using their product. ie Multi-cloud
- Can cost a lot, requires agents to be deployed
- Integrating with your own SIEM platform
- Hard to push logs out to external sources sometimes
- Can get all 3 into splunk, loki, elastic
- You have to duplicate with the cloud provider has already done
- Assess your requirements
- How much do you need live correlation vs reviewing after something happened
- Need to plan ahead
- OSCF, OTel, ECS – Standards. Pick one and use for everything
- Try log everything. Audit events, Performance metrics, Billing
- But obvious lots of logs cost logs of money
- Make it actionable – Discoverability and correlation. Automation
- Taming log Chaos
- Learn from Incidents – What sort of thing happens, what did you need availbale
- Test assumptions – eg How trusted is “internal”
- Log your logging – How would you know it is not working
- Document everything – Make it easier to detect deviations from norm
- Have processes/standards for the teams generating the events (eg what tags to use)
- Prioritise common mistakes
- Opportunity for learning
- Don’t forget to train the humans
- Think Holistically
- App security is more than just code
- Automation and tooling will help but not solve anything
- If you don’t have a security plan… Make one
- Common problems
- Devs will often post key to github
- github has a feature to block common keys, must be enabled
- Summary
- The logs you gather must be actionable
- Get familiar with the logs, and verify they actually work they way you think
- Put the logs in one place if you can
- Plan for the worst
- Don’t let the logs overwhelm you. But don’t leave important events unlogged
- The fewer platforms you use the easier it is
Developing in the open, building a product with our users by Toby Bellwood
- The Lagoon Story
- At amazee.io . Is Lagoon Lead
- What is Lagoon
- Application to Kubernetes (docker build for customer, converts to k8s)
- Docker based
- Based on git workflows. Mostly Drupal, WordPress, PHP and NodeJS apps
- Presets for the extra stuff like monitoring etc
- Why
- Cause Developers are too busy to do all that extra stuff
- and it means Ops prefer if it was all automated away (the right way)
- 8 full-time team members
- Knows a lot about application, not so much about the users (apart from Amazee.io)
- Users: Hosting providers, Agencies, Developers
- The Adopter: Someone using it for something else, weird use cases
- Agencies: Need things to go out quickly, want automation, like documentation to be good. Often will need weird technologies cause customers wants that.
- Developers: Just want it stabele. Only worried about one project at at time. Often OS minded
- User Mindset
- Building own tools using application
- Do walking tours of the system, recorded zoom session
- Use developer tools
- Discord, Slack, Office Hours, Events, Easy Access to the team
- Balance priorities
- eg stuff customers will use even those Amazee won’t use
- Engaging Upstream
- Try to be a good participant, What they would want their customers to be
- Encourage our teams to “contribute first”. Usually works well
- Empowering the Team
- Contribute under your own name
- Participate in communities
- How to stay Open Source forever?
- Widening the Core Contributor Group
- Learn from others in the Community. But most companies are not open sourcing the main component of their business.
- Unsuccessful CNCF Sandbox project
Presenting n3n – A simple Peer to Peer VPN by Hamish Coleman
- How to compares to other VPNs?
- Peer to peer
- NAT piecing
- Not all packets need to go via the server
- Distributed ethernet switch – gives extra features
- Userspace except for tuntap driver which is pretty common
- Low deployment requirements, easy to install in multiple environments
- Relatively simple security, not super secure
- History
- Based off n2n (developed by the people who did ntop)
- But they changed the license in October 2023
- Decided to fork into a new project
- First release of n3n in April 2024
- Big change was they introduced a CLA (contributor licensing agreement)
- CLAs have problems
- Legal document
- Needs real day, contributor hostile, asymmetry of power
- Can lead to surprise relicencing
- Alternatives to a CLA
- Preserving Git history
- Developer’s Certificate of Origin
- Or it could be a CLA
- Handling Changes
- Don’t surprise your Volunteers
- Don’t ignore your Volunteers
- Do discuss with you Volunteers and bring them along
- Alternatives
- Wireguard – No NAT piercing
- OpenVPN – Mostly client to Server. Also Too configurable
- Why prefer
- One simple access method (Speaker uses 4x OS)
- A single access method
- p2p avoid latency delays because local instances to talk directly
- Goals
- Protocol compatibility with n2n
- Don’t break user visible APIs
- Incrementally clean and improve codebase
- How it works now
- Supernode – Central co-ordination point, public IP, Some access control, Last-resort for packet forwarding
- Communities – Nodes join, form a virtual segment
- IP addresses
- Can just run a DHCP server inside the network
- Design
- Tries to create a full mesh of nodes
- Multiple Supernodes for metadata
- Added a few features from n2n
- INI file, Help text, Tidied up the CLI options and reduced options
- Tried to make the defaults work better
- Built in web server
- Status page, jsonRPC, Socket interfaces, Monitoring/Stats
- Current State of fork
- Still young. Another contributor
- Only soft announced. Growing base of awareness
- Plans
- IPv6
- Optimise encryption/compression
- Improve packaging and submit to distros
- Test coverage
- Better NAT piercing
- Continue improve config experience
- Selectable tuntap drivers
- Mobile phone support hoped for but probably some distance away
- Speaker’s uses for software
- Manage mothers computer
- Management interface for various servers around the world
- LAN Gaming using Windows 98 machines
- Connect back to home network to avoid region blockinghttps://github.com/n42n/n3n
- https://github.com/n42n/n3n
From the stone age to silicon: The Dwarf Axe guide to the evolution of technology by Steven Ellis
- What is a “Dwarf Axe” ?
- Snowflakes vs Dwarf Axes
- It’s an Axe that handled down and consistently delivers a service
- Both the head ( software ) and the handle ( hardware ) are maintained and upgraded separately and must be maintained. Treated like the same platform even though it is quite different from what it was originally. Delivers the same services though
- Keeps a fairly similar services. Same box on a organisation diagram
- Home IT
- Phones handed down to family members. Often not getting security patches anymore
- Enterprise IT
- Systems kept long past their expected lifetime
- Maintained via virtualisation
- What is wrong with a Big Axe?
- Too Big to Fail
- Billion dollar projects fail.
- Alternatives
- Virtual Machines – Running on Axe somewhere,
- Containers – Something big to orchestrate the containers
- Microservices – Also needs orchestration
- Redesign the Axe
- The cloud – It’s just someone else Axe
- Options
- Everything as a service. 3rd party services
- Re-use has an end-of-life
- Modern hardware should have better )and longer) hardware support
- Ephemeral Abstraction
- Run anywhere
- Scale out not up
- Avoid single points of failure
- Focus on the service (not the infra or the platform)
- Use Open tools and approaches
- Define your SOE