ICEBlock app creator Joshua Aaron to speak at HOPE hacker conference next month
9 months ago
- #hacking
- #privacy
- #activism
- HOPE_16 Opening Ceremonies kick off the event with a focus on ensuring everything works before the conference begins.
- Activism, Hactivism, and the Law: Alex Muentz discusses the risks and legal boundaries of online and in-person protests.
- Aging Cyber Safely: Laura Sang Hee Scherling and Josefina Piddo address cybersecurity awareness for older adults.
- Aphantasia: Dr. Earl Brown explores the impact of the inability to form mental images on professional and personal life.
- The ARTS Open Framework: Sabar Dasgupta presents a framework for reproducible and transparent science.
- Ask the EFF: Panelists from the Electronic Frontier Foundation discuss digital rights and resisting government surveillance.
- ATM Hacking: Roman Pushkin explores the evolution of ATM hacking with live demos.
- Back to Basics: Yael Grauer offers strategies for building resilient cyber defenses.
- Bitcoin Poker: Mattias Bergstrom delves into Satoshi Nakamoto's potential vision for decentralized gaming.
- Bitpart: Josh King introduces a platform for activism over Signal.
- Both Sides of the Wire: John Kiriakou discusses surveillance, whistleblowing, and a cyber peace movement.
- Bridging the Decentralized Gap: Panel explores the connection between hacker culture and blockchain technology.
- Build a Tech Community: William Hutson shares insights on fostering local tech communities through hackathons.
- Bureaucracy Hacking: Adam L. Hesch explains how to exploit bureaucratic systems for positive change.
- Claw Back Your Data: Micah Lee and redshiftzero introduce Cyd, a tool to reclaim data from Big Tech.
- Communication in Internet Shutdowns: Cora Rowena Ruiz rethinks mesh messaging for protests.
- Computational Techniques for Karaoke: Jamie Brew makes karaoke more challenging with esoteric datasets.
- The Computer Underground Scene: Panel discusses the past, present, and future of hacker culture.
- Counter-Surveillance as Activism: Aman Abhishek highlights using cameras against state violence.
- Cracking Enigma: Brais Macknik-Conde details the cryptographic breakthroughs that broke Enigma.
- CRXaminer: Mark El-Khoury dives into Chrome extension security.
- Dark Web Digger: Samantha Stortz and Dominick Foti explore modular scraping for dark web intelligence.
- Data Autonomy: Marlon Kautz offers counter-surveillance strategies for civil society.
- Design for Neurodiversity: Dorothy Howard discusses creating neuro-inclusive spaces.
- DIY Police Scanner: nop explains how to build a police scanner with SDRs and open-source software.
- Eco-Hacking Desire: Jasmin Hagendorfer explores the environmental impact of digital intimacy.
- Esolangs as a Hacker Folk Art: Daniel Temkin examines esoteric programming languages as art.
- Expanding the BioArtBot Color Palette: Danny Chan guides beginners in lab automation and biosafety.
- Exploiting LLM Vulnerabilities: David Kuszmar discusses emergent vulnerabilities in large language models.
- The Five Pillars for Rewriting History: Panel examines how technology reshapes historical narratives.
- The Free Software Movement: Craig Topham shares his journey and the importance of free software.
- From Activism to Hacktivism: Panel discusses resisting digital repression.
- The Future of Email Is Open: Dejan Strbac and William Lessard introduce OpenEmail, a privacy-focused email protocol.
- Getting Out of DOGE: Adam Klasfeld and Sahil Lavingia reveal insights from the Department of Government Efficiency.
- Hackers Got Talent: Jason Scott hosts a talent show for hackers.
- Hacking Search: Vladimir Prelovac introduces Kagi, a user-centric search engine.
- Hacking the Future at Tesla Science Center: Panel discusses projects at Nikola Tesla's lab.
- Hacking the Tech-Industrial Complex: Seth Godin examines the systems driving culture.
- Hack the Violin Part 2: Andrew Morican and Ebmbat explore AI in violin playing and teaching.
- Hardware Hacking Meets Art: Davis DeWitt shares how movie special effects are made.
- HOPE_16 Badge: Victoria Joh and Vinicius Fortuna discuss the challenges of badge production.
- How Location Data Brokers Track Millions: Bill Budington and Lena Cohen reveal tracking practices and how to stop them.
- How I Used LLMs to Get Top 250 on HTB: Rambo Anderson-You shares his AI-driven CTF workflow.
- How Law Enforcement Compromises Encrypted Chat: Joseph Cox details police tactics against encrypted platforms.
- How to Be Positively Transgressive: Johannes Grenzfurthner reclaims subversion for positive change.
- Human Augmentation: Panel explores hacking human perception and performance with technology.
- Into the Fediverse: Evan Prodromou discusses decentralized social media.
- Invisible Ink of Compression: XlogicX explores unconventional uses of DEFLATE compression.
- Itinerant Signal Institute: Amelia Marzec uses open-source tech to examine land use.
- Leading When TSHTF: George Sandford offers lighthearted advice for surviving chaos.
- Media, Vibe Coding, and the Long Tail: Lydia Laurenson discusses the future of alternative media.
- Meshtastic Attacktastic: Dave Schwartzberg explores vulnerabilities in Meshtastic networks.
- New Journalism: Patrick Boehler reimagines information networks.
- Not Your Private Army: Emma Best examines hacktivist spaces co-opted by hostile interests.
- NymVPN: Harry Halpin introduces a decentralized mixnet for anonymity.
- Off-Grid Data Running: LambdaCalculus discusses the Pirate Box project for off-grid communication.
- Offworld Voyage: Scott Beibin and Elizabeth Jane Cole explore training for Mars and climate adaptation.
- Packets Over Any Wire: Haxedalot explores alternative networking mediums.
- Phrack Magazine #72: Netspooky and TMZ celebrate 40 years of Phrack.
- Piracy Is the Future of Streaming: Abigail and Benjamin De Kosnik present data on unofficial media consumption.
- The Political and AI Singularity: Roel Schouwenberg discusses AI's impact on culture and cognition.
- The Present and Future of Online Discourse: Harper Reed addresses pro-social outcomes in tech.
- Print, Build, Fly, Heal: Dana Gretton and Jaguar Kristeller discuss 3D-printed medical delivery drones.
- PrivacySafe and 3NWeb: Mikalai Birukou introduces user-centric digital sovereignty.
- PrivacyTests.org: Arthur Edelstein audits web browser privacy.
- Quantum Computing and AppSec: Sheshananda Reddy Kandula prepares for post-quantum threats.
- The Quantum Curtain: Ed Ryan discusses export controls on AI and quantum tech.
- QWK Packets: Jason Scott explores the impact of QWK packets on BBS culture.
- RDP Spray and Pray: Tess Mishoe researches modern RDP attacks.
- A Red Team Exercise 2025: Panel conducts a live red team exercise.
- rim: Dana Gretton and Jaguar Kristeller reclaim data sovereignty in wearables.
- The Shape of the Legal Battlefield: Ken Vedaa addresses legal concerns for InfoSec professionals.
- A Sleuth's Stories: Mu Yang shares detecting large-scale research fraud.
- Small Budget, Big Protection: Robert Wagner offers cyber defense for SMBs.
- Solving My Identity Crisis: Dr. Phill Hallam-Baker extends DNS handle accounts.
- Spooky Action at a Discount: Kody Kinzie builds DIY Meshtastic nodes.
- StickTock.com: Sean O'Brien introduces an open-source TikTok alternative.
- The Struggle for Connection: Jack Gangi discusses rebuilding third spaces.
- Systems of Dehumanization: Daly Barnett examines digital threats to bodily autonomy.
- Things You Wish You Knew About Software Testing: Dan Nagle shares practical testing techniques.
- Tips on Living Life: Mitch Altman offers existential advice for interesting times.
- Top Ten SDR and Ham Radio Apps: Steve Bossert highlights popular open-source radio projects.
- Building Your Own Phone: Wesley Appler shares his journey to create a privacy-focused phone.
- Turning Leaks Into Leads: Ezana Ceman and Klil Eden use OCCRP Aleph for investigations.
- Unearthing Air: Todd Whitney hacks air quality monitoring.
- When the Lawman Comes Calling: Fred Jennings covers handling government data demands.
- Zodiac Killer Marketing: Chef Adam Sobel shares unconventional business tactics.
- HOPE_16 Closing Ceremonies wrap up the conference with reflections and cleanup.