BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.protocol.berlin//protocol-berg-v2//speaker//MX9MGS
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-protocol-berg-v2-TJ7FEP@cfp.protocol.berlin
DTSTART;TZID=CET:20250613T101500
DTEND;TZID=CET:20250613T102500
DESCRIPTION:Journalists in politically-isolating environments face increasi
 ng threats from commodity spyware\, often relying on NGOs for digital secu
 rity support\, not without bottlenecks and privacy risks. Recent abuses of
  mobile forensics tools\, such as Cellebrite\, highlight the dangers of ce
 ntralized mobile security falling into the wrong hands. This proposal intr
 oduces a distributed Cyber Threat Intelligence (CTI) network integrating T
 raffic Light Protocol (TLP) and zero-knowledge proofs (Semaphore) to enabl
 e privacy-preserving\, trustless indicator sharing. By leveraging honeypot
 -driven threat indicators and decentralized pub/sub mechanisms\, at-risk u
 sers can safely contribute to and benefit from a broader CTI ecosystem wit
 hout exposing personal metadata.
DTSTAMP:20260414T212733Z
LOCATION:Cinema 6
SUMMARY:Swarming by the STIX: Exploring decentralized Traffic Light Protoco
 l (TLP) and Semaphore for Spyware Honeytrapper indicator-sharing in highly
 -surveilled environments - Casey Carr
URL:https://cfp.protocol.berlin/protocol-berg-v2/talk/TJ7FEP/
END:VEVENT
END:VCALENDAR
