Hope 2016 July 22, 2016 to July 24, 2016, new york,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
2016 Car Hacking Tools Eric Evenchick , Craig Smith This presentation will focus on some of the most recent car hacker tools and techniques. ...
Accessibility: A Creative Solution to Living without Sight Shaf Patel In this presentation, Shaf will be discussing the various methods blind and visually impaired people ...
All Ages: How to Build a Movement Deb Nicholson , Molly De Blanc We want the free software movement to keep growing and one facet of successful movement ...
Anti-Forensics AF Int0x80 This presentation is the screaming goat anti-forensics version of those "Stupid Pet Tricks" segments on ...
Ask the EFF: The Year in Digital Civil Liberties Kurt Opsahl , Parker Higgins , Jacob Hoffman-andrews , Vivian Brown Get the latest information about how the law is racing to catch up with technological ...
Attacking the Source: Surreptitious Software Features (and How to Become Extremely Paranoid) Joshua Forget about network perimeters - an organization's real attack surface is made up of which ...
Biology for Hackers and Hacking for Biology Kevin Chen , Jameson Dungan Biotechnology is information technology - software that you can code and engineer. It is becoming ...
The Black Holes in Our Surveillance Map Marcy Wheeler While Edward Snowden has revealed a lot about the NSA's surveillance, our federal and local ...
Bringing Down the Great Cryptowall Weston Hecker Ransomware has been running rampant for the past six years and there has been very ...
Bring the Noise: Ten Years of Obfuscation as Counter-Surveillance Daniel C. Howe It has been a decade now since the release of TrackMeNot, the first privacy tool ...
Building Your Own Tor-centric ISP for Fun and (non)Profit Gareth Llewellyn Following the Snowden revelations and with the U.K. government's revival of the Snooper's Charter legislation, ...
Can We Sue Ourselves Secure? The Legal System's Role in Protecting Us in the Era of Mass Data Leaks and Internet of Things Alex Muentz Large data breach stories just merge into one another. Weak IoT security is no secret. ...
CAPTCHAs - Building and Breaking Dr_dave , R3dfish CAPTCHAs are the most common form of web activity security and they play an important ...
Censorship- and Coercion-Resistant Network Architectures Ed Platt Decentralized network architectures can protect against vulnerabilities not addressed by strong encryption. Encryption works well, ...
Censorship, Social Media, and the Presidential Election Elissa Shevinsky There is increasing interest in the ability of companies like Facebook and Twitter to influence ...
Chinese Mechanical Locks - Insight into a Hidden World of Locks Lucas Zhao Chinese-made locks have traditionally had poor reputations. The Chinese-made locks that we usually encounter in ...
The Code Archive Filippo Valsorda , Salman Aljammaz Archiving web pages is hard. Crawling, images, assets... Javascript! But archiving code is not. It ...
Code Is from Mars, the Courts Are from Venus: Reverse Engineering Legal Developments on Reverse Engineering Alexander Urbelis , Sebastian Holst This past May, in response to the growing sophistication of cyberattacks and application exploits, U.S. ...
Coding by Voice with Open Source Speech Recognition David Williams-king Carpal tunnel and repetitive strain injuries can prevent programmers from typing for months at a ...
Come into My (Biohacking) Lab and See What's on the Slab Tom Keenan It's 1979 and bright young hackers are torturing their Commodore PETs and Apple IIs to ...
Computer Science Curricula's Failure - What Can We Do Now? Ming Chow , Roy Wattanasin We are still facing the same security vulnerabilities from over a decade ago. The problems ...
Constructing Exocortices with Huginn and Halo The Doctor Huginn (https://github.com/cantino/huginn) is an open-source human capability-amplifying and augmentation system which implements scenarios - networks ...
Crypto War II: Updates from the Trenches Matt Blaze , Sandy ‘mouse’ Clark For several years, law enforcement has been complaining that legal wiretaps are "going dark" (especially ...
De-Anonymizing Bitcoin One Transaction at a Time David Décary-hétu , Mathieu Lavoie Bitcoin is an established virtual currency well known for enabling affordable and efficient transfers of ...
Deconstructing Ad Networks for Fun and Profit Timothy Libert This talk focuses on an open-source software tool, webXray, which detects the presence of third-party ...
Democratizing Wireless Networks with LimeSDR: Open Source, Field-Programmable RF Technology Ebrahim Bushehri This talk presents new, low-cost, open-source, field programmable RF technology, where flexibility is extended from ...
Detour Through Their Minds: How Everyday People Think the Internet Works Gillian "Gus" Andrews When you work in IT or Infosec, it may feel like you're constantly fighting a ...
FOIA and Public Records Hacking: How to Complete a FOIA Request or Dox Yourself via the Privacy Act Caitlin Kelly Henry Learn how the key to writing successful FOIA requests is reverse engineering agency data structures. ...
FOIA at Fifty Jameel Jaffer , David Pozen The Supreme Court has stated that the Freedom of Information Act "defines a structural necessity ...
Freedom and Privacy in Our Lives, Our Governments, and Our Schools Richard Stallman If we don't control the program, it controls us. It is clearer every year that ...
F*ck it, We'll Do It Live: Eight Years of Radio Statler! Johnny Xmas , Beaches , Nikgod , Techdarko , Bunni3burn , Stoppay Since 2008, Radio Statler has been broadcasting original content from HOPE to the rest of ...
Go Hack Yourself! Michael Hernandez Hacking of all kinds requires discipline and concentration. Over the past few years, Michael has ...
Hackers Are Whistleblowers Too: Practical Solidarity with the Courage Foundation Yan Zhu , Nathan Fuller , Grace North , Naomi Colvin , Carey Shenkman , Lauri Love In the two years since the Courage Foundation was launched, they have supported beneficiaries at ...
Hacking DNA: Heritage and Health Care Nina Alli Humans are the compilation of bio-code that has been changing and evolving for almost 200,000 ...
Hacking Housing Luke Iseman , Heather Stewart Luke and Heather will discuss their work building shipping container based, off-grid, open-source houses and ...
Hacking Machine Learning Algorithms Kyle Polich Algorithms control more and more of the systems we interact with on a daily basis. ...
Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure Kit Stubbs Hacker culture celebrates technological empowerment: encouraging people to move beyond passive consumerism towards building and ...
Hacking through Business: Theory and Logistics Mitch Altman , Limor ( Ladyada ) Fried , Phil Torrone , Ben Dubin-thaler , Sean Auriti , Charles Beckwith It's rare that you see an engineer as CEO, but occasionally taking a technical idea ...
How Anonymous Narrowly Evaded Being Framed as Cyberterrorists Gabriella "biella" Coleman Over the years, Biella has used many different words and phrases to describe Anonymous: hydra, ...
How to Start a Crypto Party Comet Crowbar Learning about encryption tools can be intimidating. If you don't feel comfortable with a computer, ...
How to Torrent a Pharmaceutical Drug Michael Swan Laufer , Bethany Koval Why are people still being left to die from treatable diseases when they can't afford ...
I "Hacked" for China Zimmer Barnes For six months, Zimmer was hacker-in-residence for a top Chinese engineering university, tasked with mentoring ...
Information Overload and the "Last Foot" Problem Nick Lum , Andrew Cantino There's so much to read and so little time. Unlike past generations who awoke to ...
Iridium Satellite Hacking Schneider , Stefan "sec" Zehl The Iridium satellite system has been in orbit for over 15 years now and provides ...
Is the Brain the Next Hackable Driver? Ellen Pearlman Do our EEG, fMRI, and other biometric data contain the essence of who we are ...
Keynote Address Cory Doctorow We are so stoked to have Cory Doctorow as our keynote this year. We've been ...
Leak Hypocrisy: A Conversation on Whistleblowers, Sources, and the Label "Espionage" Jesselyn Radack , Naomi Colvin , Carey Shenkman The two-tiered injustice system: high-level officials who leak for political gain get cover; those blowing ...
LinkNYC Spy Stations John Young , Deborah Natsios The infamous team from cryptome.org and cartome.org will report on the new LinkNYC kiosks' origins, ...
Lockpicking in Real Life versus on the Screen Deviant Ollam , Nite 0wl , Max Power We all know that Hollywood has a difficult time portraying hackers accurately. This quirk often ...
LockSport Roadshow: Bring Your Oddities! Toool There have been plenty of talks at HOPE teaching you to pick conventional locks. But ...
Matehacking: Legalizing Autonomous Production and Permaculture - Establishing a Hack Farm Fabrício Do Canto This talk will focus on a proposal to create a "mate hacking farm." Technologization is ...
The Mathematical Mesh and the New Cryptography Phillip Hallam-baker Recent events have reminded us again of the urgent need to make encryption ubiquitous on ...
Medical Devices: Pwnage and Honeypots Adam Brand , Scott Erven We know medical devices are exposed to the Internet both directly and indirectly, so just ...
Mesh VPN with Service Discovery Spencer Krum Krum Tinc provides a secure mesh VPN for any number of hosts. Spencer and his friends ...
Monitoring Dusty War Zones and Tropical Paradises - Being a Broadcast Anthropologist Mark Fahey Tuning in distant foreign radio and television stations is a conduit to unique and exotic ...
National Security Letters: The Checks and Balances Aren't Strong Enough - Sometimes They're Nonexistent Nicholas Merrill Twelve years have passed since Nicholas Merrill first began his lawsuit challenging the constitutionality of ...
The Next Billion Certificates: Let's Encrypt and Scaling the Web PKI Jacob Hoffman-andrews Let's Encrypt is a free and automated certificate authority to encrypt the web, launched in ...
Now and Then, Here and There Jason Scott In the last few years, the Internet Archive (archive.org) has steered deeply into the worlds ...
The Onion Report David Goulet , Asn , Nima Fatemi The Tor community, network, and ecosystem are growing and evolving at a very fast pace ...
Only You Can Stop Police Surveillance - Here's How Matt Cagle , Mariko Hirose , Jared Friend As America debates policing reforms, police departments continue to rapidly acquire surveillance technology in secret, ...
Open Source Malware Lab Robert Simmons The landscape of open-source malware analysis tools improves every day. A malware analysis lab can ...
Orbital Mechanics Ate My Weblog Edward K. Beale At high latitudes, orbital mechanics make deep-ocean Internet almost impossible. In most cases, it is ...
The Ownerless Library Paul Kernfeld Managing a subversive digital library takes courage: Julian Assange is in exile and the founders ...
The Panama Papers and the Law Firm Behind It: Shady Lawyers Caught With Their Pants Down Alexander Urbelis , Manos Megagiannis The Panama Papers are beyond question one of the most significant acts of whistleblowing next ...
A Penetration Tester's Guide to the Azure Cloud Apostolos Mastoris The wide adoption and the benefits of cloud computing has led many users and enterprises ...
The Phuture of Phreaking The Cheshire Catalyst Phone phreaking has always been about the exploration of the PSTN (Public Switched Telephone Network). ...
Presidential Twitter Bot Experience Roni Bandini Until a few months back, Argentina had a monarchy-styled government that included huge corruption, nepotism, ...
Privacy, Anonymity, and Individuality - The Final Battle Begins Steven Rambam First came the assault on privacy. Name, address, telephone, DOB, SSN, physical description, friends, family, ...
Privacy Badger and Panopticlick vs. the Trackers, Round 1 William Budington , Cooper Quintin Increasingly, as you navigate the web, your movements are being tracked. Even when you reject ...
SecureDrop: Two Years on and Beyond Garrett Robinson Two years ago, Freedom of the Press Foundation introduced HOPE to their just-launched SecureDrop project, ...
The Securitization of Cyberspace and Its Impact on Human Rights Sacha Van Geffen , Mallory Knodel , Stefania Milan , Camille Francoise A handful of representatives from governments, the private sector, and civil society comprise an international ...
Security Options for High Risk Travelers Ryan Lackey Aggressive surveillance and espionage has long been a fact of life for government agents traveling ...
Seven Continents: A Telecom Informer World Tour Tprophet As The Telecom Informer, TProphet has traveled all over the world and visited all seven ...
Show Networks John Huntington Behind the scenes on most any large entertainment production today - from an arena spectacle ...
The Silk Road to Life without Parole - A Deeper Look at the Trial of Ross Ulbricht Joshua Horowitz , Andy Greenberg , Patrick Howell O'neill , Alex Winter Join Joshua Horowitz, one of Ross Ulbricht's defense attorneys, tech journalists Andy Greenberg and Patrick ...
Slicing and Dicing Espionage: The Technical Aspect of Hunting Spies James M. Atkinson TSCM (Technical Security Countermeasures) is the U.S. federal government's abbreviation for electronic counter-surveillance. This talk ...
Smart Cities and Blockchains: New Techno-Utopian Dreams or Nightmares? Burcu Baykurt , James Cropcho , Benjamin Dean History is littered with techno-utopian visions, particularly those of powerful American industrialists. Henry Ford's Fordlandia, ...
Social Engineering Emmanuel Goldstein Since 1994, we've had a lot of fun with this panel, where we not only ...
Spy Hard with a Vengeance: How One City Stood up to the Department of Homeland Security Aestetix , Brian Hofer This talk will cover the reign of surveillance that has secretly taken over the United ...
Stealing Bitcoin with Math Filippo Valsorda , Ryan Castellucci Bitcoin is the best thing that ever happened to bored applied cryptographers: it's a public ...
Sunset or Evolution of the PSTN? Fred Goldstein The public switched telephone network has seen better days. With interest diverted to the Internet ...
Surveillance Gives Me Chills Alex Marthews In surveys, users say that government surveillance affects their online behavior, but users could always ...
This Key is Your Key, This Key is My Key Deviant Ollam , Howard Payne We all know that the four most common passwords are love, secret, sex, and god. ...
Movie: Traceroute Johannes Grenzfurthner Artist and lifelong nerd Johannes Grenzfurthner takes us on a personal road trip from the ...
The TSA Keys Leak: Government Backdoors and the Dangers of Security Theater Johnny Xmas , Nite 0wl , Darksim905 In late 2015, hackers revealed yet another threat to American privacy, but this time it ...
Tuning in to New York City's Pirates of the Air David Goren Pirate radio in New York City is a homegrown cultural phenomenon that is at once ...
Understanding Tor Onion Services and Their Use Cases David Goulet , Asn , Nima Fatemi In the last few years, we've seen more and more interest in Tor onion services ...
Water Security: Are We in De-Nile or In-Seine? Water Policies, Availability, Geeks Without Bounds and You Chris Kubecka , Lisha Sterling The backbone of a modern society is clean, available water. Without clean water, production plants ...
What is a "Neutral Network" Anyway? An Exploration and Rediscovery of the Aims of Net Neutrality in Theory and Practice Jeremy Pesner , Kate Forscey , Bob Frankston , Sam Gustin , Alfredo Lopez , Jesse Sowell This spring, the FCC's net neutrality rules were upheld in court, giving the commission license ...
What Really Happened? Fact, Truth, and Research Techniques Evan Koblentz Anyone can tell you something is true because they "researched" it. Evan will present some ...
What the Fuck Are You Talking About? Storytelling for Hackers Johannes Grenzfurthner Humans are storytelling beings. From the moment the primordial ooze Mendelized itself into something like ...
What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture Aunshul Rege , Quinn Heath How are hackers portrayed in the media? What are the typical stereotypes? How does the ...
When Video Is Not Standard Output Xionyc In a GUI-dominated cyberspace, the blind user is prey. When a UX change can mean ...
When Vulnerability Disclosure Turns Ugly Alex Muentz , Sam Bowne Sam was accused of illegal hacking in the SC Magazine article "Professor Hacks University Health ...
Who's Killing Crypto? Amie Stepanovich , Drew Mitnick Governments have gotten really good at coming up with ways to undermine encryption. They can ...
Women in Cyber Security Cindy Cullen , Renee Pollack , Debora Gondek , Kathleen Seubert With 11 percent of the cyber security workforce being women, why is it important to ...
Won't Somebody Please Think of the Journalists? Tom Lowenthal You'll never believe this one weird trick that lets you flip the script on mass ...