Remind me why we had a problem with the PSU venue, was it access to the
building, i.e. someone with an ID card to let folks in after hours?
Just curious now that I am a staff employee at PSU.


On Sun, Sep 3, 2023 at 3:47 AM Russell Senior <russ...@pdxlinux.org> wrote:

> We think we should defer you until a later date and go with the social
> hour this month while the weather is still decent. The PLUG general
> monthly meetings are the first thursday of the month, so the next date
> will be October 5th. Or November 2. Let us know what works better for
> you and what you'd like to talk about.
>
> Thanks!
>
> --
> Russell Senior
> PLUG Volunteer
> russ...@pdxlinux.org
>
> On 9/1/23 16:50, markrobertcurry wrote:
> > Hello Russell & PLUG,
> > It would depend on which talk PLUG would be most interested in me giving.
> > If you pick  one of he talks I listed that's already completed, I'm
> > prepared to do it whenever.
> > If you pick one of the talks that are 85% completion, I'll need more
> > time to finalize it.
> > If you pick the talk I remastered for BSidesPDX:
> > (How To Create A Persistent, LUKS Encrypted USB With A LUKS
> > Killswitch Using Parrot Linux)
> > I rewrote all the slides, and they're ready to present.
> > I also recorded video tutorials of the whole process.
> > which will make it way easier for anyone interested in following along
> > (making it more of a workshop than a talk)
> > (I forgot the syntax during a live demo once, i'll never let that
> > happen again)
> > I also made a cheatsheet with all the CLI syntax used in the talk.
> > (along with a corresponding descriptions).
> > Honestly, I'm honored and super excited to get the chance to talk at a
> > Linux User Group!
> > I'm completely flexible as to when you would like me to give the talk.
> > I eagerly await the decision of the LUG board members.
> >
> > Thank you for time, and I appreciate you responding to my CFP submission.
> > (I submitted talks to all the Portland InfoSec Meetups a month ago,
> > and only 2/8 of them responded)
> > I expected the InfoSec community in Portland to be much more put
> > together than it appears.
> > I moved here from from Iowa to work at Intel.
> > And the InfoSec monthly meetups were incredible!
> > Top of the industry CSOs would be there, and between 700-1,000
> > attendees would show up each month.
> > I could really use some help meeting other people in the industry,
> > anyone's help would be greatly appreciated!
> >
> >
> > Sent from Proton Secure Email
> >
> >
> >
> > -------- Original Message --------
> > On Aug 30, 2023, 12:52 PM, Russell Senior < russ...@pdxlinux.org> wrote:
> >
> >
> >     Thanks Mark! I forwarded this to Michael (also cc'd here). Would
> >     you prefer this month or a later one? It might be better for us to
> >     defer you until the weather is worse and the outdoor patio is less
> >     viable, although if you are warming it up for BSides, then maybe
> >     this month is better for you. -- Russell Senior PLUG Volunteer
> >     russ...@pdxlinux.org On 8/29/23 20:06, markrobertcurry wrote: >
> >     Hello Russell (and PLUG), > I am a Linux Engineer, I have studied
> >     Linux for 12yr now. > I have given talks at 9 InfoSec conferences
> >     over the years. > I recently remastered an old talk I gave years
> >     ago titled: > "How To Create A Persistent, LUKS Encrypted USB With
> >     A LUKS Killswitch > Using Parrot Linux" > I rewrote it for BSides
> >     this year, but I think it would be a great > talk to give at a
> >     PLUG meetup as well. > > Here is the CFP for the talk: > > ##
> >     -------------------------------------------------------------- ##
> >     > > In this presentation, I will cover: > > > Securely wipe
> >     files/device partitions (6 different methods). > > Format the USB
> >     device with Parrot Linux hybrid ISO. > > Create an Ext3 filesystem
> >     on the persistent partition. > > Create LUKS encrypted container
> >     on the persistent partition. > > Create a mount point, and mount
> >     the new LUKS encrypted partition. > > Dump the header information
> >     of a LUKS device. > > Add a nuke slot to the LUKS header. > >
> >     Create a binary backup of the LUKS header and keyslot area. > >
> >     Encrypt the LUKS header with OpenSSL for secure storage. > >
> >     Decrypt the LUKS header with OpenSSL for secure storage. > > Erase
> >     all LUKS key slots on persistant partition. > > Restore LUKS
> >     header from binary backup file. > > ##
> >     -------------------------------------------------------------- ##
> >     > > > Here are the slides: >
> >
> https://gitlab.com/xe1phix/ParrotSecWiki/-/blob/InfoSecTalk/Xe1phix-InfoSec-Talk-Materials/How-To-Create-A-%5BPersistent%5D-%5BLUKS-Encrypted%5D-USB-Device-With-%5BParrot-Linux%5D-v2-%5BBSidesPDX%5D-2023/How-To-Create-A-%5BPersistent%5D-%5BLUKS-Encrypted%5D-USB-Device-With-%5BParrot-Linux%5D-v2-%5BSlides%5D/Xe1phix-_Encrypted-Persistent-USB-NukeSlot_-Slides-_v15.7.84_.pdf
> >
> >     > > If you aren't interested in this talk, > I have several
> >     completed talks on hand: > > Secure Linux VPNs - Mullvad
> >     (Wireguard, OpenVPN) + ProtonVPN > > Encrypting files with friends
> >     using GnuPG > > Intro to Linux filesystems (ZFS, Btrfs, XFS, and
> >     Ext4) > > Secure Linux Sandboxes - Using Firejail and AppArmor > >
> >     Secure IRC Setup - Using Firejail, AppArmor, Wireguard, OpenVPN, >
> >     CertFP (SASL + TLS), Irc2P, and Tor > > Talks in development: >
> >     (75%+ completion, can be completed by Oct meetup) > > Intro to
> >     Linux Anonymity Networks - Using I2P (I2PSnark, Irc2P, > I2PMail,
> >     IMule), and Tor (TorBrowser, Whonix, OnionShare, Ricochet, >
> >     Briar, and Session) > > Pentesting IPv6 - Using the THC-Hydra IPv6
> >     Attack Toolkit > > Secure Linux Firewalls - Using IPTables,
> >     PFSense, IPSet, and FWSnort > > Secure Android Messaging - Using
> >     Session, Briar, aTox, Telegram, and > Element > > Secure Android
> >     Networking - Using Mullvad, Wireguard, OpenVPN, > ProtonVPN, and
> >     TorBrowser > > Linux Forensic Analysis - using Sleuthkit (fls,
> >     ils, icat, mmls, > etc), dc3dd, dcdldd, Foremost, ddrescue, and
> >     guymager > > Linux Metadata Forensics - Analysis, anonymization,
> >     and manipulation > (using Exiftool, Exifprobe, Exiv2, etc) > >
> >     Linux PDF Forensics - Using pdf-parser, hachoir, peepdf, pdfid,
> >     etc > > Securing Linux Kernel Modules - Using Modprobe and kernel
> >     module > parameters > > Hardening Linux Sysctl Settings - Securing
> >     SysFS options > > > Thank you for considering my presentation >
> >     You can contact me at markrobertcu...@protonmail.com > > > Sent
> >     with Proton Mail secure email. > > > > -------- Original Message
> >     -------- > On Aug 29, 2023, 2:30 PM, xe1phix <
> >     xe1p...@protonmail.ch> wrote: > > > Xe1phix's GnuPG Key: >
> >
> https://gitlab.com/xe1phix/Gnupg/blob/master/publickey.xe1phix_protonmail.ch.asc
> >
> >     Sent with Proton Mail secure email. ------- Forwarded Message >
> >     ------- From: Russell Senior Date: On Monday, August 28th, 2023 at
> >     > 9:39 PM Subject: [PLUG] No Speaker for September yet, anybody
> >     want > to or have a lead? To: plug-annou...@pdxlinux.org , >
> >     plug@pdxlinux.org > Hi folks, > > Neither Michael (last I checked)
> >     > nor I have a speaker lined up for > September 7. Does anyone
> >     have > something they'd like to talk about or > know anyone who
> >     might? If > not, we are rapidly heading for another UnPLUG > at,
> >     presumably, > Rose City Book Pub again. I joked last month that
> >     the > last > speaker was responsible for finding the next speaker,
> >     or they had > > to speak again. But everyone just laughed. I
> >     thought it sounded > like a > great idea. > > Anyway, ANY IDEAS?
> >     Reply to > plug@pdxlinux.org or me. > > Thanks! > > > -- > Russell
> >     Senior > > PLUG Volunteer > russ...@pdxlinux.org >
> >
>
>

Reply via email to