Well, I'm attending it in the hopes of learning about how some of these attacks work, and how to defend against them. Helps me teach my students better practices (and myself as well).
To be honest, I had planned on having an old laptop with a brand new kubuntu install on it (no data I care about) and just doing some blender work and note taking offline, and never connecting it to a network while at the convention.
However, I'm curious, if I set up an ssh tunnel to a server I've already established a Key system with, wouldn't ssh throw up a huge warning from a man in the middle attack not having the right "handshake"? At that point I'd only be hosed if I was dumb enough to say "connect anyway"?.
Phil W.