Time | Marillac - Fri | Little Theatre - Fri | Tobin - Fri |
---|---|---|---|
0950 | HOPE XV Begins! | HOPE XV Begins! | |
1000 | AI: A Gradient Descent Into Humanity’s Doldrums - Hope Comes From the Hackers Saul D. Robinson |
Outline Toolkit: VPNs, Serverless Strategies, and Beyond - Build Your Own Defense Against Online Censorship Junyi Yi, Vinicius Fortuna |
|
1100 | Protecting jetBlue Airways From Cyber Threats in the “Clouds” Randy Naraine, Greg Speranza |
Why Are We Insecure? An Ethical Hacker’s Lonely Road to Cyber Dystopia David Jacoby |
Robot Invasion! The Rise of Educational Robotics Lee Hollman |
1200 | In the Twilight of Copyright Ed Ryan |
Group Mesh Messaging for Large-Scale Protests Tushar Jois |
Pwn Chromebook With Linux Derek Hobbs |
1300 | A Preparation Kit for Increasing Irrelevance Jason Scott |
TLDR: Terms of Service - Privacy, Data Collection, and Coercive Agreements Marcia K. Wilbur |
Ham Radio for Hackers Dan Romanchik (KB6NU) |
1400 | The History of Leaks Emma Best, Emily Crose |
1400 - A Discussion of a Past, Present, and (Possible) Future of Bioweapons Lucas Potter, Meow-Ludo, Xavier Palmer |
Flights of Fancy: Celebrating the Dead Ends of the Jet Engine Revolution Davide Semenzin |
1500 | Ask the EFF Cara Gagliano, Beryl Lipton, Bill Budington, Hannah Zhao |
DIY Geoengineering Luke Iseman |
Explosive Overflow: Lessons From Rocket Science Mark El-Khoury |
1600 | Protecting the Network Traffic of One Billion People: Reverse-Engineering Chinese Cryptography Mona Wang, Jeffrey Knockel, Zoë Reichert |
Flying Signals: What to Do With Them Steve Bossert |
Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs Suha Sabi Hussain (suhacker) |
1700 | Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data Micah Lee |
They’re Still Using Balloons... - Disseminating Information Into North Korea in 2024 Amon Poston |
Our Defensive Security Blind Spot Wesley Hales |
1800 | Ransomware Gone Kinetic James Taliento (JT), Guillermo Christensen, Matthew Leidlein, Ashley Rose |
An Account on Cybersecurity Outside of Traditional Spaces Allen Walker IV |
Strength in Unity: Sharing Is Caring Fae Carlisle |
1900 | Survey and Scrutiny of Election Security Douglas Lucas |
“Musings of a Mechatronic Mistress: The Peculiar Purpose of Tiffany the Sex Robot” Jasmin Hagendorfer Jason Scott, Johannes Grenzfurthner |
Right to Repair in California (SB 244) - Using New Legislation for DIY Wheelchair Repair CriptasticHacker |
2000 | AI, Solarpunk, and an Uncertain Future in Computing rolltime |
iWar 2024: The Evolution of Information Warfare in the Digital Age a.k.a What Happens When You Run the Internet Through CRISPR? Alexander Urbelis, Daniel Nowak, Roel Schouwenberg |
Get High Like Planes: Combining Psychology, Social Engineering, and AI to Compel Real World Actions SecuritySean, XaiL |
2100 | Hacking Is a Mindset, Not a Skillset: A Non-Technical Guide to Building Solidarity Infrastructures With Friends moshfet, io |
Live Show Technology: Past, Present, and Future - Have We Reached a Maturity Point? John Huntington |
Social Justice and Prompt Engineering: What We Know So Far Tilde Thurium |
2200 | Teaching With Microcontrollers: Hope for Ethical Hacking Education on a Budget Kody Kinzie |
PERFORMANCES | |
2300 | PERFORMANCES |
Time | Marillac - Sat | Little Theatre - Sat | Tobin - Sat |
---|---|---|---|
1000 | Climate Hacking to Save the Planet Greg Newby |
Choose Your Own Dystopia: How Our Decisions on AI Can Lead Us to Different Futures Laura Upegui |
Net Who-trality: Revisiting the FCC Fake Comment Scandal Jason Prechtel |
1100 | Love, Hackers, and Robots: A Reflection of My First Year in the Biohacking Community Karen Ng |
What’s Happening With Appin: Fighting Redacted Reporting and the Censorship of Threat Intelligence Cooper Quintin, Emma Best, Lorax Horne, Alexander Urbelis |
From Hackerspace to Hackerhome Chris Meyer |
1200 | Past, Present, Predictions - A Look Into AI, Deep Fakes, Social Media PsyOps, and Their Effect on the Upcoming Election Cycle BiaSciLab |
Hacktivism for Organizers: Social Change From the Keyboards Danacea Vo, Matt Mitchell |
Popping S(h)ells - Hunting for Vulns in the Stock Market Eric Bryce |
1300 | Automating Transparency: A New Era for FOIA Requests Florin Badita |
The Fundamentals of Veilid: cDc Breaks the Internet, and You Can Too! Katelyn “medus4” Bowden, Paul “The_Gibson” Miller |
AI Made a 0-Day: Noah Get the Boat Erica Burgess |
1400 | Star Monitor: Updates on Standards and Internet Governance Mallory Knodel |
Librarians Are Radicalizing Their Communities About Why the Internet Is Broken Alison Macrina, Tess Wilson, Reanna Esmail, Eliza Bettinger, Kimberly Springer |
Using the J Language to Streamline Hacking Devon H. McCormick |
1500 | Tobias on Locks and Insecurity Engineering Marc Weber Tobias |
BADBOX: Behind the Scenes of an Android Supply-Chain Attack Bill Budington |
Hacking Your Health: Adventures in Building a Glucose Monitor Michael Dierkes |
1600 | EOL... RLY? Ending The Epidemic of Bricked and Abandoned Stuff Paul Roberts, Lodrina Cherne, John Bumstead |
Telecom in an Exclave TProphet |
Modern Day Automobile Safety: Rescue Ops Using CanBus John C. Checco |
1700 | Tales From the Crypt... Analyst: The Afterlife Jeff Man |
Less Power to Porn Tech Giants, More Love in the Cyberspace Spring Cooper, Alessandro Polidoro |
PortableSecret - Carry and Share Your Most Critical Secrets Without Special Software M' |
1800 | Our Communities, Resiliency, Our Future Mitch Altman |
The Real Danger From AI Is Not the Technology Tom Kranz |
Strengthening Security Culture Through Compassion and Understanding Davis (cdchris12) |
1900 | Chaos and Undetectable Communications Lucas Rooyakkers |
Congress' Privacy Wars in 2024 Alex Marthews, Stephen Perez |
Making Surveillance Policy Change in Canada: Slow Burns and Sudden Actions Evan Light |
2000 | Addressing Online Threats: AI’s Role in Countering Harmful Social Media Content and Its Real-World Impact Welton Chang, Eric Curwin |
“Hacking at Leaves” Peter Romine, Aaron Hillis, Ryan Finnigan, Jasmin Hagendorfer (2.5 HOURS) |
|
2100 | Hackers Got Talent Jason Scott (2 HOURS) |
“Hacking at Leaves” Peter Romine, Aaron Hillis, Ryan Finnigan, Jasmin Hagendorfer (2.5 HOURS) |
|
2200 | Hackers Got Talent Jason Scott (2 HOURS) |
PERFORMANCES (2230) | There's Always HOPE for Privacy: Policy Wins and Needs Mean Gene, Ben Wiseman |
2300 | Demoscene 2024: Just When You Thought There Wasn’t Any More! Inverse Phase (3 HOURS) |
PERFORMANCES |
Time | Marillac - Sun | Little Theatre - Sun | Tobin - Sun |
---|---|---|---|
1000 | Bait and Switching Costs - How Big Tech Took the Web and How to Take It Back Phillip Hallam-Baker |
What Wi-Fi Devices Are Nearby? Any Cameras Watching Me? Caleb Madrigal |
Animism and Artificial Intelligence: A Practical Guide Aisling Fae (transfaeries) |
1100 | The Future of Leaks: What’s Next for the Online Library of Hacked Data? Emma Best, Lorax Horne |
Psychoactive Drugs: How They Hack the Brain and What It Means for Our Minds Dr. Jen, PharmD |
Navigating Geopolitical Nuances in Cyberattacks With Advanced IP Address Analysis Andréanne Bergeron, Constance Prevot |
1200 | Circumventing Prison Tech Censorship Jeremy Hammond, Cooper Quintin |
Working Towards a Sneakernet for Libre Biotech Wetware Danny Chan |
Harvest: The Most Interesting Computer You Never Heard Of Peter Capek |
1300 | In the End, We Will All Become Stories - The Importance of Hacking Contexts and Narratives Johannes Grenzfurthner |
Hack the Violin: A Hacker’s Approach to Learning, Playing, and Teaching the Violin Andrew Morican |
Safeguarding Secrets: Homomorphic Encryption for the Curious Mind Vikram Saraph |
1400 | Enshittification: Why Everything Suddenly Got Worse and What to Do About It Cory Doctorow (2 HOURS) |
SIMULCAST: Enshittification: Why Everything Suddenly Got Worse and What to Do About It Cory Doctorow (2 HOURS) |
Cap2r: Rescuing the Forgotten Texts Hidden in Analog Video Adam Tannir |
1500 | Enshittification: Why Everything Suddenly Got Worse and What to Do About It Cory Doctorow (2 HOURS) |
SIMULCAST: Enshittification: Why Everything Suddenly Got Worse and What to Do About It Cory Doctorow (2 HOURS) |
The Arduboy Story Kevin Bates |
1600 | Nikola Tesla: The Futurist of Yesterday Douglas Borge |
A Revolution in Representation: Computation Comes to Democracy’s Aid Elizabeth Barry |
Privacy-Focused Computing Curriculum for Teens Gaelen Hadlett |
1700 | Hack (To Heal) the Planet Unixjazz |
Innovating for Impact: Building Technology in Resource-Constrained Environments Jason A. Long, Alexander Urbelis |
News From the 2600net IRC Network and Facebook Group Andrew Strutt, dclaw, Daniel Baldor, Tim Benish |
1800 | CLOSING CEREMONIES | SIMULCAST: CLOSING CEREMONIES |