BornHack 2019 Aug. 8, 2019 to Aug. 15, 2019, Funen, Denmark

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
markdown+latex+gitlab Morten Nielsen Since others will mention LateX in lightning talks, I want to tell you what we ...
Creating slides using LaTeX Kramse Doing slides can be very frustrating. WYSIWYG programs are often clunky and you dont need ...
IT security education at UCL Morten Nielsen This is a continuation of the talk from last year, where we announced our upcoming ...
Status of data.coop 2019 Benjamin Balder Bach This talk is just me describing the design of my current email setup: How I ...
Not Invented Here: My email stack Niels Serup This talk is just me describing the design of my current email setup: How I ...
Final call for IPv4 Asbjørn Sloth Tønnesen N/A
Genode Emery N/A
We're in it for the long-haul – reflections on European internet policies in 2019 Amelia Andersdotter N/A
Hate to say we told you so: Some cracked insights of a professional ex-tinfoilhat Anders Kjærulff For the past 8 years ive been working on the fringes of privacy and surveallance, ...
Confessions of a nerd - featuring drones, self driving, Ai, surveilence and the doomsday machine Nikolaj Sonne Using a cooler from a Ford Escort, a waterfountain pump, a peltier and home soldered ...
Next digital frontier of European Policy: Values and Hope Karen Melchior Newly elected MEP Karen Melchior will try to charter a way for the next 5 ...
This year's electronic badge Thomas Flummer On this talk, we will take a look at this years electronic badge, look into ...
Testing for website accessibility issues Kasper Truica The community of website users with disabilities or impairments is as wide-ranging and diverse as ...
Machine Learning Crash Course Mateusz Jurewicz Goal of this presentation:To introduce people without a machine learning (ML) background to the basic ...
Differential Privacy - An Introduction and an Application Teresa Steiner Differential privacy aims at solving the problem of data anonymization in data analysis, specifically for ...
A Journey to GraphQL Jimmi Kristensen TV 2 is a commercial broadcasting station based in Denmark. Beside traditional broadcasting TV we ...
Anarchitecture Anders Rune Jensen Today computer systems are often built with an implicit hierarchy. It can be seen as ...
post-its, post-its, post-its everywhere (and how they relate to physical keys) Jos Weyers A password shouldn’t be on a post-it note.In plain view.On the console.The password to a ...
Be Cynical Jimmi Kristensen Testing distributed applications, such as microservices, can be difficult. In production, when network is involved, ...
NixOS, a functional GNU/Linux distro Robert Helgesson NixOS is a GNU/Linux distribution built on the Nix package manager and the Nix domain ...
Adventures in hardware standardisation Amelia Andersdotter Amelia has spent two years attending hardware standardisation bodies such as IEEE, the 3GPP and ...
Web Security Map - Monitor your government! Elger "stitch" Jonker Web Security Map can create a map of your country, showing basic security issues. It ...
Bufferbloat and Beyond: How we reduced delays in the Linux networking stack by orders of magnitude Toke Høiland-jørgensen Bufferbloat is when a bottleneck router in the network reacts to congestion by queueing up ...
Hardware and Protocols Lord Herr Bugblue In my daily life I encounter a lot of hardware from different ages and they ...
Can you trust your encrypted cloud? An assessment of SpiderOakONE's security Anders Dalskov This talk presents the results of a security review performed back in late 2017 of ...
Ekometic: The Future Is Listening Cristian Vogel Ekometic is a fledgling Sonic Design Agency based in Copenhagen, founded in Summer 2019. We ...
Introduction to the Tor Ecosystem Alexander Færøy In this presentation we will be walking over the design and implementation of the Tor ...
PaF || STFU Klondike PaF (Patch and Fix) is a methodology focused on getting hands on towards a solution ...
Sustainability challange and the role of hackers Igor Nikolic In this talk we will explore the current global sustainability situation, the possible ways forward ...
Limiting side-effects of applications at compile-time Ramón Soto Mathiesen By using tools where you have a clear separation between code branches that makes effects ...
Alt om ulovlig logning / Illegal data retention in Denmark Rasmus Malver DA: Nyt år, ny minister, nye indrømmelser. Talsperson fra Foreningen imod Ulovlig Logning, Rasmus Malver, ...
Introduction to Mix Networks and Katzenpost: a new anonymity movement David Stainton This talk will introduce the fundamental concepts of mix networks as well as the Katzenpost ...
Secure Scuttlebutt - An off-grid peer-to-peer social network Jacob Karlsson A networking protocol, database, and a group of clients, all designed from the bottom up ...
Hacking a random fiber router and acting all cool about how you broke some crappy coding and a system running software from 10 years ago! Stef I will describe hacking some router, i intend to go through the process of hardware ...
LO! An LLVM Obfuscator Klondike In this talk we will present how intermediate code transformations can be used to obfuscate ...
concieggs: An extensible IRC bot architecture with an attitude Niels Serup Internet Relay Chat (IRC) is a very basic protocol for text chatting on the internet. ...
Making use of Futhark, a purely functional GPU programming language Troels Henriksen Futhark is a data-parallel programming language that has been invented to ease the programming of ...
Public collaboration and open source in OS2-Offentligt Digitaliseringsfællesskab Jens Kjellerup How do municiplalities in Denmark coorporate, develop and govern software in the OS2-offenligt digitaliseringsfællesskab and ...
Security challenges faced by journalists Jurre van bergen How do you secure a large group of international journalists? Where do you start? What ...
A brief look at the root cause of most Spanish security issues Klondike In this talk we will talk about how the different particularities of the spanish ecosystem ...
Wolf in Sheep’s Clothing - updated Benoît Ancel Despite the breach of both Hacking Team and FinFisher, the government malware industry remains a ...
State of the network Bornhack Come and meet the network team who will talk about the design and operation of ...
A walk down memory lane - Home computing in the 70's and 80's Mike Mike" Hi! My name is Mike, i have a passion for old preserving computers, i have ...
Bornhack DECT network 2019 edition Klondike In this talk we will share our experiences creating the DECT and telephony network for ...