Hasty Briefsbeta

Bilingual

ICEBlock app creator Joshua Aaron to speak at HOPE hacker conference next month

9 months ago
  • #hacking
  • #privacy
  • #activism
  • HOPE_16 Opening Ceremonies kick off the event with a focus on ensuring everything works before the conference begins.
  • Activism, Hactivism, and the Law: Alex Muentz discusses the risks and legal boundaries of online and in-person protests.
  • Aging Cyber Safely: Laura Sang Hee Scherling and Josefina Piddo address cybersecurity awareness for older adults.
  • Aphantasia: Dr. Earl Brown explores the impact of the inability to form mental images on professional and personal life.
  • The ARTS Open Framework: Sabar Dasgupta presents a framework for reproducible and transparent science.
  • Ask the EFF: Panelists from the Electronic Frontier Foundation discuss digital rights and resisting government surveillance.
  • ATM Hacking: Roman Pushkin explores the evolution of ATM hacking with live demos.
  • Back to Basics: Yael Grauer offers strategies for building resilient cyber defenses.
  • Bitcoin Poker: Mattias Bergstrom delves into Satoshi Nakamoto's potential vision for decentralized gaming.
  • Bitpart: Josh King introduces a platform for activism over Signal.
  • Both Sides of the Wire: John Kiriakou discusses surveillance, whistleblowing, and a cyber peace movement.
  • Bridging the Decentralized Gap: Panel explores the connection between hacker culture and blockchain technology.
  • Build a Tech Community: William Hutson shares insights on fostering local tech communities through hackathons.
  • Bureaucracy Hacking: Adam L. Hesch explains how to exploit bureaucratic systems for positive change.
  • Claw Back Your Data: Micah Lee and redshiftzero introduce Cyd, a tool to reclaim data from Big Tech.
  • Communication in Internet Shutdowns: Cora Rowena Ruiz rethinks mesh messaging for protests.
  • Computational Techniques for Karaoke: Jamie Brew makes karaoke more challenging with esoteric datasets.
  • The Computer Underground Scene: Panel discusses the past, present, and future of hacker culture.
  • Counter-Surveillance as Activism: Aman Abhishek highlights using cameras against state violence.
  • Cracking Enigma: Brais Macknik-Conde details the cryptographic breakthroughs that broke Enigma.
  • CRXaminer: Mark El-Khoury dives into Chrome extension security.
  • Dark Web Digger: Samantha Stortz and Dominick Foti explore modular scraping for dark web intelligence.
  • Data Autonomy: Marlon Kautz offers counter-surveillance strategies for civil society.
  • Design for Neurodiversity: Dorothy Howard discusses creating neuro-inclusive spaces.
  • DIY Police Scanner: nop explains how to build a police scanner with SDRs and open-source software.
  • Eco-Hacking Desire: Jasmin Hagendorfer explores the environmental impact of digital intimacy.
  • Esolangs as a Hacker Folk Art: Daniel Temkin examines esoteric programming languages as art.
  • Expanding the BioArtBot Color Palette: Danny Chan guides beginners in lab automation and biosafety.
  • Exploiting LLM Vulnerabilities: David Kuszmar discusses emergent vulnerabilities in large language models.
  • The Five Pillars for Rewriting History: Panel examines how technology reshapes historical narratives.
  • The Free Software Movement: Craig Topham shares his journey and the importance of free software.
  • From Activism to Hacktivism: Panel discusses resisting digital repression.
  • The Future of Email Is Open: Dejan Strbac and William Lessard introduce OpenEmail, a privacy-focused email protocol.
  • Getting Out of DOGE: Adam Klasfeld and Sahil Lavingia reveal insights from the Department of Government Efficiency.
  • Hackers Got Talent: Jason Scott hosts a talent show for hackers.
  • Hacking Search: Vladimir Prelovac introduces Kagi, a user-centric search engine.
  • Hacking the Future at Tesla Science Center: Panel discusses projects at Nikola Tesla's lab.
  • Hacking the Tech-Industrial Complex: Seth Godin examines the systems driving culture.
  • Hack the Violin Part 2: Andrew Morican and Ebmbat explore AI in violin playing and teaching.
  • Hardware Hacking Meets Art: Davis DeWitt shares how movie special effects are made.
  • HOPE_16 Badge: Victoria Joh and Vinicius Fortuna discuss the challenges of badge production.
  • How Location Data Brokers Track Millions: Bill Budington and Lena Cohen reveal tracking practices and how to stop them.
  • How I Used LLMs to Get Top 250 on HTB: Rambo Anderson-You shares his AI-driven CTF workflow.
  • How Law Enforcement Compromises Encrypted Chat: Joseph Cox details police tactics against encrypted platforms.
  • How to Be Positively Transgressive: Johannes Grenzfurthner reclaims subversion for positive change.
  • Human Augmentation: Panel explores hacking human perception and performance with technology.
  • Into the Fediverse: Evan Prodromou discusses decentralized social media.
  • Invisible Ink of Compression: XlogicX explores unconventional uses of DEFLATE compression.
  • Itinerant Signal Institute: Amelia Marzec uses open-source tech to examine land use.
  • Leading When TSHTF: George Sandford offers lighthearted advice for surviving chaos.
  • Media, Vibe Coding, and the Long Tail: Lydia Laurenson discusses the future of alternative media.
  • Meshtastic Attacktastic: Dave Schwartzberg explores vulnerabilities in Meshtastic networks.
  • New Journalism: Patrick Boehler reimagines information networks.
  • Not Your Private Army: Emma Best examines hacktivist spaces co-opted by hostile interests.
  • NymVPN: Harry Halpin introduces a decentralized mixnet for anonymity.
  • Off-Grid Data Running: LambdaCalculus discusses the Pirate Box project for off-grid communication.
  • Offworld Voyage: Scott Beibin and Elizabeth Jane Cole explore training for Mars and climate adaptation.
  • Packets Over Any Wire: Haxedalot explores alternative networking mediums.
  • Phrack Magazine #72: Netspooky and TMZ celebrate 40 years of Phrack.
  • Piracy Is the Future of Streaming: Abigail and Benjamin De Kosnik present data on unofficial media consumption.
  • The Political and AI Singularity: Roel Schouwenberg discusses AI's impact on culture and cognition.
  • The Present and Future of Online Discourse: Harper Reed addresses pro-social outcomes in tech.
  • Print, Build, Fly, Heal: Dana Gretton and Jaguar Kristeller discuss 3D-printed medical delivery drones.
  • PrivacySafe and 3NWeb: Mikalai Birukou introduces user-centric digital sovereignty.
  • PrivacyTests.org: Arthur Edelstein audits web browser privacy.
  • Quantum Computing and AppSec: Sheshananda Reddy Kandula prepares for post-quantum threats.
  • The Quantum Curtain: Ed Ryan discusses export controls on AI and quantum tech.
  • QWK Packets: Jason Scott explores the impact of QWK packets on BBS culture.
  • RDP Spray and Pray: Tess Mishoe researches modern RDP attacks.
  • A Red Team Exercise 2025: Panel conducts a live red team exercise.
  • rim: Dana Gretton and Jaguar Kristeller reclaim data sovereignty in wearables.
  • The Shape of the Legal Battlefield: Ken Vedaa addresses legal concerns for InfoSec professionals.
  • A Sleuth's Stories: Mu Yang shares detecting large-scale research fraud.
  • Small Budget, Big Protection: Robert Wagner offers cyber defense for SMBs.
  • Solving My Identity Crisis: Dr. Phill Hallam-Baker extends DNS handle accounts.
  • Spooky Action at a Discount: Kody Kinzie builds DIY Meshtastic nodes.
  • StickTock.com: Sean O'Brien introduces an open-source TikTok alternative.
  • The Struggle for Connection: Jack Gangi discusses rebuilding third spaces.
  • Systems of Dehumanization: Daly Barnett examines digital threats to bodily autonomy.
  • Things You Wish You Knew About Software Testing: Dan Nagle shares practical testing techniques.
  • Tips on Living Life: Mitch Altman offers existential advice for interesting times.
  • Top Ten SDR and Ham Radio Apps: Steve Bossert highlights popular open-source radio projects.
  • Building Your Own Phone: Wesley Appler shares his journey to create a privacy-focused phone.
  • Turning Leaks Into Leads: Ezana Ceman and Klil Eden use OCCRP Aleph for investigations.
  • Unearthing Air: Todd Whitney hacks air quality monitoring.
  • When the Lawman Comes Calling: Fred Jennings covers handling government data demands.
  • Zodiac Killer Marketing: Chef Adam Sobel shares unconventional business tactics.
  • HOPE_16 Closing Ceremonies wrap up the conference with reflections and cleanup.