linux.conf.au
LCA 2020
1. Facebook, Dynamite, Uber, Bombs, and You (Lana Brindley) None 50 min.
2. Evolution of Linux Containers to Container Native Storage... (sameer kandarkar) None 45 min.
3. The Internet: Protecting Our Democratic Lifeline (Brett Sheffield) None 50 min.
4. Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s (Steven Ellis) None 25 min.
5. Privacy and Transparency in VPN industry (Ruben Rubio Rey) None 35 min.
6. OCIv2: Container Images Considered Harmful (Aleksa Sarai) None 50 min.
7. Authentication Afterlife: the dark side of making lost password recovery harder (Ewen McNeill) None 35 min.
8. Kubernetes Developer Workflows in Visual Studio Code (Ivan Towlson) None 50 min.
9. You Shall Not Pass (Peter Burnett) None 30 min.
10. An intro to improving the security of your code with free analysis tools (Jason C Cohen) None 50 min.
11. The future of the desktop is on hypervisor powered containers (Alex Sharp, Anuj Dhavalikar) None 35 min.
12. The Psychology of Multi-Factor Authentication (William Brown) None 50 min.
13. Every Image Has A Purpose (Allan Shone) None 25 min.
14. An introduction to Penetration Testing using Kali Linux (Marcus Herstik) None 100 min.
15. Automated acceptance tests for terminal applications (Roman Joost) None 45 min.
16. We know when you are sleeping: The Rise of Energy Smart Meters (Rachel Bunder) None 45 min.
17. From bits to legs to locomotion: Building a hexapod from the ground up (Daniel McCarthy) None 45 min.
18. Snek: A Python-Inspired Language for Tiny Embedded Computers (Keith Packard) None 45 min.
19. Building a zero downtime Kubernetes cluster (Feilong Wang) None 45 min.
20. Piku: git push deployments to your own servers (Chris McCormick) None 45 min.
21. I Was Wrong (Karen Sandler) None 45 min.
22. Everything Awesome about GPU Drivers (Daniel Vetter) None 45 min.
23. Verified seL4 on secure RISC-V processors (Gernot Heiser) None 45 min.
24. Like, Share and Subscribe: Effective Communication of Security Advice (Serena Chen) None 45 min.
25. Good, better, breast: Building a sensing mastectomy prosthetic with open hardware (Kathy Reid) None 45 min.
26. What Makes Decentralisation Hard? And How Do We Overcome This? (Martin Krafft) None 45 min.
27. The Linux network stack extension for DDoS mitigation and web security (Alexander Krizhanovsky) None 45 min.
28. Velociraptor - Dig Deeper (Mike Cohen) None 100 min.
29. What UNIX Cost Us (Benno Rice) None 45 min.
30. Panfrost: Open Source meets Arm Mali GPUs (Robert Foss) None 45 min.
31. Planning for and handling failures from open hardware, aviation, to production at Google (Marc MERLIN) None 45 min.
32. Securing Container Runtimes -- How Hard Can It Be? (Aleksa Sarai) None 45 min.
33. Privacy is not Binary: A discussion of data systems, ethics, and human rights (Elizabeth Alpert, Amelia Radke) None 45 min.
34. How internet congestion control actually works in the bufferbloat age (Dave Taht) None 45 min.
35. Clevis and Tang: securing your secrets at rest (Fraser Tweedale) None 45 min.
36. Kicad for software developers (David Tulloh) None 100 min.
37. Control Flow Integrity in the Linux Kernel (Kees Cook) None 45 min.
38. Open collaborations: leadership succession and leadership success (Ann Smith, Myk Dowling) None 45 min.
39. Desktop Linux, without a keyboard, mouse or desk (Shervin Emami) None 45 min.
40. Electronics from your Kitchen Drawer (Peter Chubb) None 45 min.
41. It's All About Timing (Dave Chinner) None 45 min.
42. Open Source Citizenship (Josh Simmons) None 45 min.
43. Open AND High Performance Computing (Hugh Blemings) None 45 min.
44. No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think (Nathan Willis) None 45 min.
45. The Story of PulseAudio and Compress Offload (Arun Raghavan) None 45 min.
46. Linux in the Cloud, on Prem, or... on a Mainframe? (Elizabeth K. Joseph) None 45 min.
47. Decoding battery management data - back in the old school (Paul Wayper) None 45 min.
48. Engineer tested, manager approved: Migrating Windows/.NET services to Linux (Katie Bell) None 45 min.
49. When Jargon Becomes Gibberish (Casey Schaufler) None 45 min.
50. Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative (Jon Manning) None 45 min.
51. A B C of 3D : Introduction to making 3D art using blender (sreenivas alapati) None 100 min.
52. Musings of an Accidental Chair - change from the inside out (Lyndsey Jackson) None 45 min.
53. Collecting information with care (Opal Symes) None 45 min.
54. In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds (Trent Lloyd) None 45 min.
55. VM block error injection, a novel approach for testing Linux storage (Tony Asleson) None 45 min.
56. Behind (and under) the scenes of the Meson build system (Jussi Pakkanen) None 45 min.
57. NTFS really isn't that bad (Robert Collins) None 45 min.
58. Building an ethical data infrastructure (Marissa Takahashi) None 45 min.
59. Introduction to Rust (for people who have never used a compiler) (Tim McNamara) None 100 min.
60. ROS on your robot: the tale of an inside, an outside robot and 2 arms (Ben Martin) None 45 min.
61. Privacy Preserving IoT (Christopher J Biggs) None 45 min.
62. Portable, Attested, Secure Execution with Enarx (Nathaniel McCallum) None 45 min.
63. How to capture 100G Ethernet traffic at wire speed to local disk (Christoph Lameter) None 45 min.
64. KUnit - Unit Testing for the Linux Kernel (Brendan Higgins) None 45 min.
65. The Ops in the Serverless (Jennifer Davis) None 45 min.
66. The Secret Life of Routers (Sachi King) None 45 min.
67. The EU Says The Laws of Mathematics Apply in Australia (Dan Shearer) None 45 min.
68. Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists (Bradley M. Kuhn, Karen Sandler) None 45 min.
69. Room scale VR tracking with OpenHMD (Jan Schmidt) None 45 min.
70. How to Write a Retro Arcade Emulator (Josh Bassett) None 45 min.
71. Macro Security for your Microservices (Sreejith Anujan) None 100 min.
72. Using WhatsApp as a Command Line ( Breaking out of the walled Garden) (Tishampati Dhar) None 45 min.
73. Playable Ads: What REALLY are they? (Evan Kohilas) None 45 min.
74. Practical Ethics: building it better in 2020 and beyond (Nicola Nye) None 45 min.
75. eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V (Ben Leslie) None 45 min.
76. What Lies Beneath: What are they really tracking and how? (Anne Jessel) None 45 min.
77. Large Pages in Linux (Matthew Wilcox) None 45 min.
78. Advanced Stream Processing on the Edge (Eduardo Silva) None 45 min.
79. Everything you know is wrong: why using big words can made you sound stupid (Lana Brindley) None 45 min.
80. The Fight to Keep the Watchers at Bay (Mark Nottingham) None 45 min.
81. Behind the scenes of an ELK system (Rafael Martinez Guerrero) None 100 min.
82. TPM based attestation - how can we use it for good? (Matthew Garrett) None 45 min.
83. Zero Trust SSH (Jeremy Stott) None 45 min.
84. The magical fantasy land of Linux kernel testing (Russell Currey) None 45 min.
85. Privacy, Security, Convenience; when it comes to home automation, can we pick all three? (Ben Dechrai) None 45 min.
86. Securing firmware: Secure and Trusted boot in OpenBMC (Joel Stanley) None 45 min.
87. Building a Compiler for Quantum Computers (Matthew Treinish) None 45 min.
88. Affordable Custom Input Devices (Jonathan Oxer, Chris Fryer) None 45 min.
89. RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection (Esther Payne) None 45 min.
90. smbcmp: A new tool to diff network captures (Aurélien Aptel) None 45 min.
91. Professional quality layout design with Scribus (Kathy Reid) None 100 min.
92. Transpile anything to everything! (Anna Herlihy) None 45 min.
93. The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains (Nathan Woodrow) None 45 min.
94. "Write a single library to handle all input devices, it'll be easy" they said... (Peter Hutterer) None 45 min.
95. Betrusted: Better Security Through Physical Partitioning (bunnie, Sean "xobs" Cross, Tom Marble) None 45 min.
96. Senseless - environmental sensing without additional hardware (Kim Burgess) None 45 min.
97. Tensorflow on open source GPUs (David Airlie) None 45 min.
98. Privacy and Decentralisation with Multicast (Brett Sheffield) None 45 min.
99. New Phone, Who Dis?: Human Authentication in the Digital Age (Yaakov) None 45 min.
100. How to make kernel and user space CI for input devices? (Benjamin Tissoires) None 45 min.

1. None 50 min.
2. None 45 min.
3. None 50 min.
4. None 25 min.
5. None 35 min.
6. None 50 min.
7. None 35 min.
8. None 50 min.
9. None 30 min.
10. None 50 min.
11. None 35 min.
12. None 50 min.
13. None 25 min.
14. None 100 min.
15. None 45 min.
16. None 45 min.
17. None 45 min.
18. None 45 min.
19. None 45 min.
20. None 45 min.
21. None 45 min.
22. None 45 min.
23. None 45 min.
24. None 45 min.
25. None 45 min.
26. None 45 min.
27. None 45 min.
28. None 100 min.
29. None 45 min.
30. None 45 min.
31. None 45 min.
32. None 45 min.
33. None 45 min.
34. None 45 min.
35. None 45 min.
36. None 100 min.
37. None 45 min.
38. None 45 min.
39. None 45 min.
40. None 45 min.
41. None 45 min.
42. None 45 min.
43. None 45 min.
44. None 45 min.
45. None 45 min.
46. None 45 min.
47. None 45 min.
48. None 45 min.
49. None 45 min.
50. None 45 min.
51. None 100 min.
52. None 45 min.
53. None 45 min.
54. None 45 min.
55. None 45 min.
56. None 45 min.
57. None 45 min.
58. None 45 min.
59. None 100 min.
60. None 45 min.
61. None 45 min.
62. None 45 min.
63. None 45 min.
64. None 45 min.
65. None 45 min.
66. None 45 min.
67. None 45 min.
68. None 45 min.
69. None 45 min.
70. None 45 min.
71. None 100 min.
72. None 45 min.
73. None 45 min.
74. None 45 min.
75. None 45 min.
76. None 45 min.
77. None 45 min.
78. None 45 min.
79. None 45 min.
80. None 45 min.
81. None 100 min.
82. None 45 min.
83. None 45 min.
84. None 45 min.
85. None 45 min.
86. None 45 min.
87. None 45 min.
88. None 45 min.
89. None 45 min.
90. None 45 min.
91. None 100 min.
92. None 45 min.
93. None 45 min.
94. None 45 min.
95. None 45 min.
96. None 45 min.
97. None 45 min.
98. None 45 min.
99. None 45 min.
100. None 45 min.

1, Facebook, Dynamite, Uber, Bombs, and You, Facebook_Dynamite_Uber_Bombs_and_You.mp4, 50
2, Evolution of Linux Containers to Container Native Storage..., Evolution_of_Linux_Containers_to_Container_Native_Storage.mp4, 45
3, The Internet: Protecting Our Democratic Lifeline, The_Internet_Protecting_Our_Democratic_Lifeline.mp4, 50
4, Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s, Dynamic_Workloads_need_Dynamic_Storage_using_rookceph_with_k8s.mp4, 25
5, Privacy and Transparency in VPN industry, Privacy_and_Transparency_in_VPN_industry.mp4, 35
6, OCIv2: Container Images Considered Harmful, OCIv2_Container_Images_Considered_Harmful.mp4, 50
7, Authentication Afterlife: the dark side of making lost password recovery harder, Authentication_Afterlife_the_dark_side_of_making_lost_password_recovery_harder.mp4, 35
8, Kubernetes Developer Workflows in Visual Studio Code, Kubernetes_Developer_Workflows_in_Visual_Studio_Code.mp4, 50
9, You Shall Not Pass, You_Shall_Not_Pass.mp4, 30
10, An intro to improving the security of your code with free analysis tools, An_intro_to_improving_the_security_of_your_code_with_free_analysis_tools.mp4, 50
11, The future of the desktop is on hypervisor powered containers, The_future_of_the_desktop_is_on_hypervisor_powered_containers.mp4, 35
12, The Psychology of Multi-Factor Authentication, The_Psychology_of_MultiFactor_Authentication.mp4, 50
13, Every Image Has A Purpose, Every_Image_Has_A_Purpose.mp4, 25
14, An introduction to Penetration Testing using Kali Linux, An_introduction_to_Penetration_Testing_using_Kali_Linux.mp4, 100
15, Automated acceptance tests for terminal applications, Automated_acceptance_tests_for_terminal_applications.mp4, 45
16, We know when you are sleeping: The Rise of Energy Smart Meters, We_know_when_you_are_sleeping_The_Rise_of_Energy_Smart_Meters.mp4, 45
17, From bits to legs to locomotion: Building a hexapod from the ground up, From_bits_to_legs_to_locomotion_Building_a_hexapod_from_the_ground_up.mp4, 45
18, Snek: A Python-Inspired Language for Tiny Embedded Computers, Snek_A_PythonInspired_Language_for_Tiny_Embedded_Computers_2.mp4, 45
19, Building a zero downtime Kubernetes cluster, Building_a_zero_downtime_Kubernetes_cluster.mp4, 45
20, Piku: git push deployments to your own servers, Piku_git_push_deployments_to_your_own_servers.mp4, 45
21, I Was Wrong, I_Was_Wrong.mp4, 45
22, Everything Awesome about GPU Drivers, Everything_Awesome_about_GPU_Drivers.mp4, 45
23, Verified seL4 on secure RISC-V processors, Verified_seL4_on_secure_RISCV_processors.mp4, 45
24, Like, Share and Subscribe: Effective Communication of Security Advice, Like_Share_and_Subscribe_Effective_Communication_of_Security_Advice.mp4, 45
25, Good, better, breast: Building a sensing mastectomy prosthetic with open hardware, Good_better_breast_Building_a_sensing_mastectomy_prosthetic_with_open_hardware.mp4, 45
26, What Makes Decentralisation Hard? And How Do We Overcome This?, What_Makes_Decentralisation_Hard_And_How_Do_We_Overcome_This.mp4, 45
27, The Linux network stack extension for DDoS mitigation and web security, The_Linux_network_stack_extension_for_DDoS_mitigation_and_web_security.mp4, 45
28, Velociraptor - Dig Deeper, Velociraptor_Dig_Deeper.mp4, 100
29, What UNIX Cost Us, What_UNIX_Cost_Us.mp4, 45
30, Panfrost: Open Source meets Arm Mali GPUs, Panfrost_Open_Source_meets_Arm_Mali_GPUs.mp4, 45
31, Planning for and handling failures from open hardware, aviation, to production at Google, Planning_for_and_handling_failures_from_open_hardware_aviation_to_production_at_Google.mp4, 45
32, Securing Container Runtimes -- How Hard Can It Be?, Securing_Container_Runtimes_How_Hard_Can_It_Be.mp4, 45
33, Privacy is not Binary: A discussion of data systems, ethics, and human rights, Privacy_is_not_Binary_A_discussion_of_data_systems_ethics_and_human_rights.mp4, 45
34, How internet congestion control actually works in the bufferbloat age, How_internet_congestion_control_actually_works_in_the_bufferbloat_age.mp4, 45
35, Clevis and Tang: securing your secrets at rest, Clevis_and_Tang_securing_your_secrets_at_rest.mp4, 45
36, Kicad for software developers, Kicad_for_software_developers.mp4, 100
37, Control Flow Integrity in the Linux Kernel, Control_Flow_Integrity_in_the_Linux_Kernel.mp4, 45
38, Open collaborations: leadership succession and leadership success, Open_collaborations_leadership_succession_and_leadership_success.mp4, 45
39, Desktop Linux, without a keyboard, mouse or desk, Desktop_Linux_without_a_keyboard_mouse_or_desk.mp4, 45
40, Electronics from your Kitchen Drawer, Electronics_from_your_Kitchen_Drawer.mp4, 45
41, It's All About Timing, Its_All_About_Timing.mp4, 45
42, Open Source Citizenship, Open_Source_Citizenship.mp4, 45
43, Open AND High Performance Computing, Open_AND_High_Performance_Computing.mp4, 45
44, No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think, No_Docs_No_Problem_From_Zero_to_Full_Documentation_in_Less_Time_than_You_Think.mp4, 45
45, The Story of PulseAudio and Compress Offload, The_Story_of_PulseAudio_and_Compress_Offload.mp4, 45
46, Linux in the Cloud, on Prem, or... on a Mainframe?, Linux_in_the_Cloud_on_Prem_or_on_a_Mainframe.mp4, 45
47, Decoding battery management data - back in the old school, Decoding_battery_management_data_back_in_the_old_school.mp4, 45
48, Engineer tested, manager approved: Migrating Windows/.NET services to Linux, Engineer_tested_manager_approved_Migrating_WindowsNET_services_to_Linux.mp4, 45
49, When Jargon Becomes Gibberish, When_Jargon_Becomes_Gibberish.mp4, 45
50, Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative, Compiling_Your_Story_Using_Techniques_from_Compiler_Design_to_Check_Your_Narrative.mp4, 45
51, A B C of 3D : Introduction to making 3D art using blender, A_B_C_of_3D_Introduction_to_making_3D_art_using_blender.mp4, 100
52, Musings of an Accidental Chair - change from the inside out, Musings_of_an_Accidental_Chair_change_from_the_inside_out.mp4, 45
53, Collecting information with care, Collecting_information_with_care.mp4, 45
54, In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds, Indepth_technical_story_Fixing_IO_performance_for_Windows_guests_in_OpenStack_Ceph_clouds.mp4, 45
55, VM block error injection, a novel approach for testing Linux storage, VM_block_error_injection_a_novel_approach_for_testing_Linux_storage.mp4, 45
56, Behind (and under) the scenes of the Meson build system, Behind_and_under_the_scenes_of_the_Meson_build_system.mp4, 45
57, NTFS really isn't that bad, NTFS_really_isnt_that_bad.mp4, 45
58, Building an ethical data infrastructure, Building_an_ethical_data_infrastructure.mp4, 45
59, Introduction to Rust (for people who have never used a compiler), Introduction_to_Rust_for_people_who_have_never_used_a_compiler.mp4, 100
60, ROS on your robot: the tale of an inside, an outside robot and 2 arms, ROS_on_your_robot_the_tale_of_an_inside_an_outside_robot_and_2_arms.mp4, 45
61, Privacy Preserving IoT, Privacy_Preserving_IoT.mp4, 45
62, Portable, Attested, Secure Execution with Enarx, Portable_Attested_Secure_Execution_with_Enarx.mp4, 45
63, How to capture 100G Ethernet traffic at wire speed to local disk, How_to_capture_100G_Ethernet_traffic_at_wire_speed_to_local_disk.mp4, 45
64, KUnit - Unit Testing for the Linux Kernel, KUnit_Unit_Testing_for_the_Linux_Kernel.mp4, 45
65, The Ops in the Serverless, The_Ops_in_the_Serverless.mp4, 45
66, The Secret Life of Routers, The_Secret_Life_of_Routers.mp4, 45
67, The EU Says The Laws of Mathematics Apply in Australia, The_EU_Says_The_Laws_of_Mathematics_Apply_in_Australia.mp4, 45
68, Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists, Open_Source_Won_but_Software_Freedom_Hasnt_Yet_A_Guide_Commiseration_Session_for_FOSS_activists.mp4, 45
69, Room scale VR tracking with OpenHMD, Room_scale_VR_tracking_with_OpenHMD.mp4, 45
70, How to Write a Retro Arcade Emulator, How_to_Write_a_Retro_Arcade_Emulator.mp4, 45
71, Macro Security for your Microservices, Macro_Security_for_your_Microservices.mp4, 100
72, Using WhatsApp as a Command Line ( Breaking out of the walled Garden), Using_WhatsApp_as_a_Command_Line_Breaking_out_of_the_walled_Garden.mp4, 45
73, Playable Ads: What REALLY are they?, Playable_Ads_What_REALLY_are_they.mp4, 45
74, Practical Ethics: building it better in 2020 and beyond, Practical_Ethics_building_it_better_in_2020_and_beyond.mp4, 45
75, eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V, eChronos_Lyrae_A_64bit_multicore_RTOS_kernel_for_ARM_and_RISCV.mp4, 45
76, What Lies Beneath: What are they really tracking and how?, What_Lies_Beneath_What_are_they_really_tracking_and_how.mp4, 45
77, Large Pages in Linux, Large_Pages_in_Linux.mp4, 45
78, Advanced Stream Processing on the Edge, Advanced_Stream_Processing_on_the_Edge.mp4, 45
79, Everything you know is wrong: why using big words can made you sound stupid, Everything_you_know_is_wrong_why_using_big_words_can_made_you_sound_stupid.mp4, 45
80, The Fight to Keep the Watchers at Bay, The_Fight_to_Keep_the_Watchers_at_Bay.mp4, 45
81, Behind the scenes of an ELK system, Behind_the_scenes_of_an_ELK_system.mp4, 100
82, TPM based attestation - how can we use it for good?, TPM_based_attestation_how_can_we_use_it_for_good.mp4, 45
83, Zero Trust SSH, Zero_Trust_SSH.mp4, 45
84, The magical fantasy land of Linux kernel testing, The_magical_fantasy_land_of_Linux_kernel_testing.mp4, 45
85, Privacy, Security, Convenience; when it comes to home automation, can we pick all three?, Privacy_Security_Convenience_when_it_comes_to_home_automation_can_we_pick_all_three.mp4, 45
86, Securing firmware: Secure and Trusted boot in OpenBMC, Securing_firmware_Secure_and_Trusted_boot_in_OpenBMC.mp4, 45
87, Building a Compiler for Quantum Computers, Building_a_Compiler_for_Quantum_Computers.mp4, 45
88, Affordable Custom Input Devices, Affordable_Custom_Input_Devices.mp4, 45
89, RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection, RFC_1984_Or_why_you_should_start_worrying_about_encryption_backdoors_and_mass_data_collection.mp4, 45
90, smbcmp: A new tool to diff network captures, smbcmp_A_new_tool_to_diff_network_captures.mp4, 45
91, Professional quality layout design with Scribus, Professional_quality_layout_design_with_Scribus.mp4, 100
92, Transpile anything to everything!, Transpile_anything_to_everything.mp4, 45
93, The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains, The_life_of_open_source_spatial_with_QGIS_From_hobby_to_grown_up_with_bonus_growing_pains.mp4, 45
94, "Write a single library to handle all input devices, it'll be easy" they said..., Write_a_single_library_to_handle_all_input_devices_itll_be_easy_they_said.mp4, 45
95, Betrusted: Better Security Through Physical Partitioning, Betrusted_Better_Security_Through_Physical_Partitioning.mp4, 45
96, Senseless - environmental sensing without additional hardware, Senseless_environmental_sensing_without_additional_hardware.mp4, 45
97, Tensorflow on open source GPUs, Tensorflow_on_open_source_GPUs.mp4, 45
98, Privacy and Decentralisation with Multicast, Privacy_and_Decentralisation_with_Multicast.mp4, 45
99, New Phone, Who Dis?: Human Authentication in the Digital Age, New_Phone_Who_Dis_Human_Authentication_in_the_Digital_Age_2.mp4, 45
100, How to make kernel and user space CI for input devices?, How_to_make_kernel_and_user_space_CI_for_input_devices.mp4, 45