BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.pass-the-salt.org//pts2026//speaker//G739SC
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-pts2026-J9JGWE@cfp.pass-the-salt.org
DTSTART;TZID=CET:20260701T163000
DTEND;TZID=CET:20260701T165000
DESCRIPTION:The Rust ecosystem is often praised for its "harmonized chaos" 
 of crates\, but a new trend is emerging in security-critical tools: the to
 tal avoidance of dependencies. While projects like sudo-rs aim to reduce t
 he supply chain attack surface\, this architectural choice comes with a co
 st. During my PhD work on RootAsRole\, I discovered that dependencies mini
 misation leads to monolithic designs where security logic is tightly coupl
 ed to use-cases.\n\nThis talk explores the friction between security-harde
 ned isolation and the community’s need for reusable\, battle-tested comp
 onents. When we refuse to depend on others\, we stop contributing to share
 d building blocks. We end up reinventing the wheel\, forking unmaintained 
 libraries\, and scattering security expertise across dozens of "independen
 t" forks. I will share many insights about what is the Good\, the Bad and 
 the Ugly.
DTSTAMP:20260514T103155Z
LOCATION:Amphitheater 122
SUMMARY:Zero Dependencies sounds great... until you try to share your code 
 for the security good. - Eddie Billoir (Airbus Protect)
URL:https://cfp.pass-the-salt.org/pts2026/talk/J9JGWE/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-pts2026-NHZTG7@cfp.pass-the-salt.org
DTSTART;TZID=CET:20260702T160500
DTEND;TZID=CET:20260702T162500
DESCRIPTION:Bim bam PAM! In this talk\, we’re diving into the kitchen of 
 system security to look at the PAM (Pluggable Authentication Modules) arch
 itecture.\n\nWe’ll start by deconstructing the classic PAM lifecycle. Bu
 t instead of just "wrapping" the C API in Rust and hoping for the best\, w
 e’ll introduce nonstick. The secret sauce? We will demonstrate how nonst
 ick uses Rust's design to encode the PAM expected behavior directly into t
 he compiler.
DTSTAMP:20260514T103155Z
LOCATION:Amphitheater 122
SUMMARY:Rust\, PAM and Typestate: Cooking up spotless authentication with n
 onstick - Eddie Billoir (Airbus Protect)
URL:https://cfp.pass-the-salt.org/pts2026/talk/NHZTG7/
END:VEVENT
END:VCALENDAR
