<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>PHP UK Conference 2016 - Thomas Shone - Security Theatre</title>
        <link>https://phpc.tv/videos/watch/5dcdb2d6-4947-4253-8000-95181e921207</link>
        <description>This is not your normal security talk. Sure we talk about secure communication and the importance of hashing and encrypting (and why rolling your own is never a solution). We might even get frisky and cover some more interesting topics like true randomness, timed attacks and social engineering. But what we're really interested in is understanding what that hacker is trying to do on your site, what the motivation is and, using this, understand where you need to be vigilant. We're also going to talk about the results from an ongoing 4 year project to see just how vulnerable the average consumer website is. Theodore Sturgeon famously said 90% of everything is crud, we'll get to see just how close we come to that number. So if you're ready to see how scary the dark depths of security can be and just how scary it is when you look up and see all the leaky boats above us is, this is for you.</description>
        <lastBuildDate>Tue, 14 Apr 2026 21:36:08 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://phpc.tv</generator>
        <image>
            <title>PHP UK Conference 2016 - Thomas Shone - Security Theatre</title>
            <url>https://phpc.tv/lazy-static/avatars/a00c380b-7291-4db3-b239-61999888fbca.png</url>
            <link>https://phpc.tv/videos/watch/5dcdb2d6-4947-4253-8000-95181e921207</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://phpc.tv/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://phpc.tv/feeds/video-comments.xml?videoId=5dcdb2d6-4947-4253-8000-95181e921207" rel="self" type="application/rss+xml"/>
    </channel>
</rss>