Remind me why we had a problem with the PSU venue, was it access to the building, i.e. someone with an ID card to let folks in after hours? Just curious now that I am a staff employee at PSU.
On Sun, Sep 3, 2023 at 3:47 AM Russell Senior <russ...@pdxlinux.org> wrote: > We think we should defer you until a later date and go with the social > hour this month while the weather is still decent. The PLUG general > monthly meetings are the first thursday of the month, so the next date > will be October 5th. Or November 2. Let us know what works better for > you and what you'd like to talk about. > > Thanks! > > -- > Russell Senior > PLUG Volunteer > russ...@pdxlinux.org > > On 9/1/23 16:50, markrobertcurry wrote: > > Hello Russell & PLUG, > > It would depend on which talk PLUG would be most interested in me giving. > > If you pick one of he talks I listed that's already completed, I'm > > prepared to do it whenever. > > If you pick one of the talks that are 85% completion, I'll need more > > time to finalize it. > > If you pick the talk I remastered for BSidesPDX: > > (How To Create A Persistent, LUKS Encrypted USB With A LUKS > > Killswitch Using Parrot Linux) > > I rewrote all the slides, and they're ready to present. > > I also recorded video tutorials of the whole process. > > which will make it way easier for anyone interested in following along > > (making it more of a workshop than a talk) > > (I forgot the syntax during a live demo once, i'll never let that > > happen again) > > I also made a cheatsheet with all the CLI syntax used in the talk. > > (along with a corresponding descriptions). > > Honestly, I'm honored and super excited to get the chance to talk at a > > Linux User Group! > > I'm completely flexible as to when you would like me to give the talk. > > I eagerly await the decision of the LUG board members. > > > > Thank you for time, and I appreciate you responding to my CFP submission. > > (I submitted talks to all the Portland InfoSec Meetups a month ago, > > and only 2/8 of them responded) > > I expected the InfoSec community in Portland to be much more put > > together than it appears. > > I moved here from from Iowa to work at Intel. > > And the InfoSec monthly meetups were incredible! > > Top of the industry CSOs would be there, and between 700-1,000 > > attendees would show up each month. > > I could really use some help meeting other people in the industry, > > anyone's help would be greatly appreciated! > > > > > > Sent from Proton Secure Email > > > > > > > > -------- Original Message -------- > > On Aug 30, 2023, 12:52 PM, Russell Senior < russ...@pdxlinux.org> wrote: > > > > > > Thanks Mark! I forwarded this to Michael (also cc'd here). Would > > you prefer this month or a later one? It might be better for us to > > defer you until the weather is worse and the outdoor patio is less > > viable, although if you are warming it up for BSides, then maybe > > this month is better for you. -- Russell Senior PLUG Volunteer > > russ...@pdxlinux.org On 8/29/23 20:06, markrobertcurry wrote: > > > Hello Russell (and PLUG), > I am a Linux Engineer, I have studied > > Linux for 12yr now. > I have given talks at 9 InfoSec conferences > > over the years. > I recently remastered an old talk I gave years > > ago titled: > "How To Create A Persistent, LUKS Encrypted USB With > > A LUKS Killswitch > Using Parrot Linux" > I rewrote it for BSides > > this year, but I think it would be a great > talk to give at a > > PLUG meetup as well. > > Here is the CFP for the talk: > > ## > > -------------------------------------------------------------- ## > > > > In this presentation, I will cover: > > > Securely wipe > > files/device partitions (6 different methods). > > Format the USB > > device with Parrot Linux hybrid ISO. > > Create an Ext3 filesystem > > on the persistent partition. > > Create LUKS encrypted container > > on the persistent partition. > > Create a mount point, and mount > > the new LUKS encrypted partition. > > Dump the header information > > of a LUKS device. > > Add a nuke slot to the LUKS header. > > > > Create a binary backup of the LUKS header and keyslot area. > > > > Encrypt the LUKS header with OpenSSL for secure storage. > > > > Decrypt the LUKS header with OpenSSL for secure storage. > > Erase > > all LUKS key slots on persistant partition. > > Restore LUKS > > header from binary backup file. > > ## > > -------------------------------------------------------------- ## > > > > > Here are the slides: > > > > https://gitlab.com/xe1phix/ParrotSecWiki/-/blob/InfoSecTalk/Xe1phix-InfoSec-Talk-Materials/How-To-Create-A-%5BPersistent%5D-%5BLUKS-Encrypted%5D-USB-Device-With-%5BParrot-Linux%5D-v2-%5BBSidesPDX%5D-2023/How-To-Create-A-%5BPersistent%5D-%5BLUKS-Encrypted%5D-USB-Device-With-%5BParrot-Linux%5D-v2-%5BSlides%5D/Xe1phix-_Encrypted-Persistent-USB-NukeSlot_-Slides-_v15.7.84_.pdf > > > > > > If you aren't interested in this talk, > I have several > > completed talks on hand: > > Secure Linux VPNs - Mullvad > > (Wireguard, OpenVPN) + ProtonVPN > > Encrypting files with friends > > using GnuPG > > Intro to Linux filesystems (ZFS, Btrfs, XFS, and > > Ext4) > > Secure Linux Sandboxes - Using Firejail and AppArmor > > > > Secure IRC Setup - Using Firejail, AppArmor, Wireguard, OpenVPN, > > > CertFP (SASL + TLS), Irc2P, and Tor > > Talks in development: > > > (75%+ completion, can be completed by Oct meetup) > > Intro to > > Linux Anonymity Networks - Using I2P (I2PSnark, Irc2P, > I2PMail, > > IMule), and Tor (TorBrowser, Whonix, OnionShare, Ricochet, > > > Briar, and Session) > > Pentesting IPv6 - Using the THC-Hydra IPv6 > > Attack Toolkit > > Secure Linux Firewalls - Using IPTables, > > PFSense, IPSet, and FWSnort > > Secure Android Messaging - Using > > Session, Briar, aTox, Telegram, and > Element > > Secure Android > > Networking - Using Mullvad, Wireguard, OpenVPN, > ProtonVPN, and > > TorBrowser > > Linux Forensic Analysis - using Sleuthkit (fls, > > ils, icat, mmls, > etc), dc3dd, dcdldd, Foremost, ddrescue, and > > guymager > > Linux Metadata Forensics - Analysis, anonymization, > > and manipulation > (using Exiftool, Exifprobe, Exiv2, etc) > > > > Linux PDF Forensics - Using pdf-parser, hachoir, peepdf, pdfid, > > etc > > Securing Linux Kernel Modules - Using Modprobe and kernel > > module > parameters > > Hardening Linux Sysctl Settings - Securing > > SysFS options > > > Thank you for considering my presentation > > > You can contact me at markrobertcu...@protonmail.com > > > Sent > > with Proton Mail secure email. > > > > -------- Original Message > > -------- > On Aug 29, 2023, 2:30 PM, xe1phix < > > xe1p...@protonmail.ch> wrote: > > > Xe1phix's GnuPG Key: > > > > https://gitlab.com/xe1phix/Gnupg/blob/master/publickey.xe1phix_protonmail.ch.asc > > > > Sent with Proton Mail secure email. ------- Forwarded Message > > > ------- From: Russell Senior Date: On Monday, August 28th, 2023 at > > > 9:39 PM Subject: [PLUG] No Speaker for September yet, anybody > > want > to or have a lead? To: plug-annou...@pdxlinux.org , > > > plug@pdxlinux.org > Hi folks, > > Neither Michael (last I checked) > > > nor I have a speaker lined up for > September 7. Does anyone > > have > something they'd like to talk about or > know anyone who > > might? If > not, we are rapidly heading for another UnPLUG > at, > > presumably, > Rose City Book Pub again. I joked last month that > > the > last > speaker was responsible for finding the next speaker, > > or they had > > to speak again. But everyone just laughed. I > > thought it sounded > like a > great idea. > > Anyway, ANY IDEAS? > > Reply to > plug@pdxlinux.org or me. > > Thanks! > > > -- > Russell > > Senior > > PLUG Volunteer > russ...@pdxlinux.org > > > > >