A New HOPE 2022 July 22, 2022 to July 24, 2022, New York, NY

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
ActivityPub Four Years Later: The Good, the Bad, and the Fedi Rolltime ActivityPub celebrated its fourth anniversary as a W3C standard this January. The spec defines protocols ...
All About RADIO WONDERLAND Joshua Fried RADIO WONDERLAND will be performing live at A New Hope. This talk will expose the ...
ARTificial Intelligence - How IP Law Handles Machine Creations Ed Ryan The development of sophisticated machine learning models in recent years has been pushing into realms ...
Beyond the Digital Nomad: Finding Refuge and Building a Life Elior Sterling In this talk, you will learn about realistic options for moving to another country, getting ...
Biological Time Hacking Kenji Larsen Time is the most valuable asset we have. As biological organisms, our experience and usage ...
Botnets are the Best Way to Measure User-Hostile Behavior on the Internet David Sidi Today there are two dominant approaches to measuring behavior at scale on the web without ...
Breaking 19th Century Encrypted Newspaper Ads With Modern Means Elonka Jacobs In the 19th century, encrypted newspaper advertisements were a common method of communication. They were ...
Can You Travel Without Physically Moving? From "Online Lodging" to "Virtual Travel Package" Yoshinari Nishiki COVID-19 effectively stripped away our dreams of intercontinental travel, but gave us an opportunity which ...
Cast-Away: A DIY Platform for Video Capture, Automation, and Various Antics Adam Tannir Inspired by existing projects (and some cable company shenanigans), this venture seeks to develop a ...
Cat-Shaped Hacker Hardware: How I Accidentally Made a Business at 18 Alex Lynd Education-focused hardware fails to fill gaps of knowledge in niche areas of computer science (like ...
The CFAA Has Come a Long Way, or Has It? Alex , Er Urbelis , Joel Decapua , Jay Ravi On May 19th, for the first time in nearly a decade, the U.S. Department of ...
CHERI: A Modern Capability Architecture Dr. Filardo CHERI (Capability Hardware Enhanced RISC Instructions) is an architectural extension to existing processor Instruction Set ...
Combating "Ransom-War:" Evolving Landscape of Ransomware Infections in Cloud Databases Aditya (phd) The attackers are targeting cloud databases used for modern applications to subvert the integrity and ...
COVID Making: From Cyber Pantries to Cyber Glasses Matt Desmarais This talk will describe how Matt developed Internet of Things (IoT) devices for his work ...
Creating a General Purpose Network Through Wireless Mesh Jameson Dungan This talk will cover the creation of a resilient and redundant network across the region ...
Cyber Security Certifications: The Good, The Bad, and The Ugly Tom Kranz As hackers, we all have unique skills and abilities that are in huge demand globally. ...
Defensive Computing Michael Horowitz The focus of the tech press has always been on the sky falling. The disaster ...
Demand Protest: Manufacturing Truth in a Post-Truth Era Squarematrix Tullipso Online hoaxes have evolved from the realm of folk tales and anarchic fun to becoming ...
Demoscene 2022: Electric Boogaloo Inverse Phase Aspects of an ongoing computer art subculture called the demoscene might just permeate everything you ...
Designing for Privacy in an Increasingly Public World Robert Stribley People are increasingly concerned about their rights to privacy online. As digital designers, we need ...
Don't Get Tangled up in Your Cape: Hero Culture as a Negative Force in Cyber Security George Ford Everyone loves a good hero story, except when it provides a foundation for burnout, gatekeeping, ...
Electronic Warfare on a Budget of $15 or Less Lucas Rooyakkers You are constantly being irradiated by a plethora of gadgets and gizmos firing photons through ...
Engineering Your Own Disease Eradication Program Mixael S. Laufer How many times have you read a
An Engineer's Guide to Linux Kernel Upgrades Ignat Korchagin The Linux kernel lies at the heart of many high profile services and applications. And ...
Executive Order 14028 and Zero Trust Architecture - Now We Must, But What It Means? Harri Hursti The President's executive order on "Improving the Nation's Cybersecurity" (14028) issued on May 12, 2021 ...
Five Dollar Cyber Weapons and How to Use Them Kody Kinzie For five dollars, hackers can buy more power than ever before thanks to low-cost microcontrollers! ...
From Mind Control to Mind Expansion: Hacking Technology to Rebuild Our World Javair Patz It's time for hackers to think bigger and act bigger. We're used to poking at ...
Hack Cancer: How Hackers Can Help Save 9.5 Million Lives Every Year Karamoon Cancer is a leading cause of death worldwide, but there's never been a serious attempt ...
Hacker Representation Through the Years: A Guided Tour of Hacker Appearances in TV and Cinema Alex (mrsynackster) How did we get here? How did we get to the hacker hoodie? How did ...
Hackers Can Help: Open Technical Problems in Investigative Journalism Br Roberts Hackers and programmers are an incredible pool of talent capable of facilitating meaningful change. Brandon ...
Hackers Got Talent Jason Scott Do you have a cool talent or hack? Here's your chance to present it onstage ...
Hacking Comprehension: Overcoming Limitations to Better Understand the World and Each Other Jamie Joyce We see the world differently - literally. Our brains hallucinate reality before our "eyes" and ...
Hacking Local Politics: How We Banned Facial Recognition in Minneapolis Munira Weil The lines between technology and society are becoming blurred to the point of nonexistence. The ...
Hacking the Anthropocene: Life, Biological Complexity, Freedom! Abi Overcast Living systems reuse everything. From metabolic pathways, to DNA and amino acids, to nutrient cycles ...
Hacking the SAT Rob Cohen As the pandemic has accelerated the already emergent trend towards test-optional college and university admissions, ...
Hack the Planet... Step 1, Step 2, Step Tom Paredes Penetration testing has existed as a cyber security assurance activity for many years. Although frequently ...
hCaptcha: Profits over People and Fscking Useless Steven Presser Or "why I broke CAPTCHAs for 15 percent of the Internet." Technology is supposed to ...
How Do MRI Machines Work? An Introduction to MRI and Open Source Imaging Douglas Brantner Superconducting, cryogenically cooled, terrifyingly strong magnets, bordering on perpetual motion; radio frequency (RF) coils big ...
How Hip-Hop Can Inspire the Next Generation of Tech Innovation Manny Faces Hip-hop is a world-class disruptor. It has transformed music, popular culture, fashion, business, and advertising, ...
How to Bargain With a Black Box: Hacking a Path to Data-Driven Organizing Dan Calacci Workers across the world are increasingly subjected to data-driven and algorithmic management, where digital tools ...
How to Run a Top-10 Website, Publicly and Transparently Kunal Mehta Wikipedia is the only top-10 website that is operated by a non-profit, but more importantly, ...
In Which Interlaced Video Digitization Makes Me Forget About Dying (For a While) Jason Scott A side project to address a growing stack of videotape causes historian and archivist Jason ...
Just Enough RFID Cloning to Be Dangerous Gabe Schuyler We've all boasted, "those things are so easy to copy," but how sure are you? ...
Leaks and Hacks: Four Years of DDoSecrets Lorax B. Horne , Freddy Best Distributed Denial of Secrets has published more than 70 terabytes of data since launching in ...
Let's Talk: Bioprinting Xavier Palmer Are you curious about bioprinting? This talk will cover what bioprinting is, types of bioprinting, ...
Mad as Hell: Is There an End to Subversion? Johannes Grenzfurthner We (almost) made it through a pandemic abyss, the Trumpian "fake news" wars, right wing ...
The Mathematical Mesh Phillip Hallam-baker Another day, another data breach compromising personal data. Why don't they just encrypt? Encryption is ...
Medical Devices - Security and Privacy Issues Jim ( cipz ) , Rna And Pam Red Balaclava aka Jeopardy Jim aka the "Metrocard Hacker" from previous HOPE cons and "Off ...
Moving Beyond Amazon Self-Publishing Purgatory John Huntington Back in 2014 at HOPE X, John did a talk called "A Self-Publishing Success Story" ...
Nikola Tesla's Predictions Today Ed Wilson , Jeffrey Borge Explore the predictions of science visionary Nikola Tesla and where they stand today in this ...
Novel Exploitation Tactics in Linux Userspace: One Byte OOB Write to ROP Chain Sammy Hajhamid Many of the complex surfaces in the GNU C library, such as malloc or IO, ...
Online Operations for Protests and Pranks: How to Get the Truth Out Without Getting Shut Down Jim Peinado As the Internet centralizes, it gets harder to keep sites up that disrupt corporate power. ...
Open Source RF Experimentation Steve Cupano In a world of more software defined radio (SDR) projects and more open source hardware ...
PEnnsylvania 6-5000: A Hacker Farewell to the Hotel Pennsylvania Sidepocket And Xio The modern public knew it as the Hotel Pennsylvania. The many people who booked rooms ...
Plausible Deniability and Cryptocurrency Privacy Lane Rettig , Michelle Byte Hackers around the world use cryptocurrencies like Bitcoin and Ether every day under the mistaken ...
Porn Platforms Hate Them for Exposing Their Mischief With These Two Weird Tricks Giulia Corona , Aless Polidoro The non-profit organization Tracking Exposed (tracking.exposed/), which fosters digital rights and algorithm accountability, has developed ...
Practical Steps to Improve Privacy Michael Mcmahon After having an in-person private conversation, have you noticed your search results and advertisements mimic ...
Project MKULTRA Cracked: Declassified CIA Brain Warfare Research Indexed by Academic Publications Josh Clamp Project MKULTRA has become a modern mythology about the creation of mind controlled agents called ...
Proof of Vaccination Technology and Standards Dr. Greg Newby The technology and standards behind proof of vaccination credentials (PVCs) will be described. PVCs are ...
Quantum Computing: It's Not Just Sci-Fi Anymore Kevin Carter This talk will focus on the current state of quantum computing, including current infosec and ...
Quiet! How Local-First Software Can Keep Remote Teams Safe and Unlock a New Wave of Software Freedom Activism Holmes Wilson The pandemic pushed more groups than ever into using online collaboration tools, but for many ...
The Ransomware Protection Full of Holes Soya Aoyama In the fall of 2017, after the WannaCry outbreak, Microsoft implemented ransomware protection in Windows ...
Remember the Internet: Hacking Publishing With Instar Books Jeanne Jones During the pandemic, Instar Books launched a book series called "Remember the Internet," purporting to ...
Revolution During Disintegration: Lessons From a Brief History of Yugoslav Computing Vlado Vince The socialist Yugoslav state was in many ways an aberration of the polarized Cold War ...
Right to Repair - You Should Have the Right to Fix What You Own Louis Rossmann In this talk, Louis will share his experiences of showing manufacturers, such as Apple, that ...
School Districts Should Not Be in the Business of Intelligence Collection Harry Jackson Why in the world would a school board need to collect intelligence on parents, students, ...
Secrets of Social Media PsyOps Biascilab Psychological warfare thorough social media is one of the most powerful weapons in today's political ...
Secure Cell Phone Communication: Mission Accomplished or Popular Delusion? Dr. Nick Germaine Attempts abound to manufacture and market mobile phones wherein data generated by or about users ...
Seize the Means of Computation: How Interoperability Can Take the Internet Back From Big Tech Cory Doctorow This is a talk for people who want to destroy Big Tech. It's not a ...
Shoplifting on a Budget: Exploring Bypasses for Retail Security Tags Makeithackin Shoplifters vs. security. In this talk, you will learn how to think like a criminal... ...
Six Years Later and Worse Than Ever - The Espionage Act, Computer Fraud and Abuse Act, and What's at Stake for Activists, Journalists, and Researchers Jesselyn Radack , Carey Neuheisel The Trump administration continued the trend of using two antiquated laws - the Espionage Act ...
Social Steganography: Sending Messages in the Clear for Fun and Nonprofit (Or How I Learned to Stop Worrying and Love Cleartext) Greg Much has been spoken about the topic of the "CIA triad" (Confidentiality, Integrity, and Availability), ...
Tracking Android Malware and Auditing App Privacy for Fun and Non-Profit Bill Budington Our devices are a window into our souls, and contain a vast trove of information ...
Travel Hacking in a Still-Pandemic World Tprophet The pandemic turned the world of travel upside down, introducing many new restrictions and requirements. ...
Unpickable But Still Unlockable: Lock Bypass Tricks in the Field Bill Ng Physical red-teams rely heavily on nondestructive bypasses when doing vulnerability assessments: under-the-door tools, latch-based attacks, ...
Using Security Automation to Organize Your Cyber Threat Intelligence Knowledge Andrew Ku Enterprise security tooling is expensive. Enterprise intelligence tooling is expensive. Enterprise cyber threat intelligence tooling ...
We'll Pwn You With Your Wattpad Profile Roman Hauksson-neill Most people don't know how to choose secure passwords. From those that aren't even long ...
Why Building Digital Libraries Matters Davide Semenzin This talk will examine digitizing books at scale and some interesting technology tidbits as to ...
Why Professor Garfield Should Be Your Child's Best Friend on the Internet The Cheshire Catalyst Professor Garfield is our old friend Garfield the Cat from the funny papers, but he ...
Writing for the Ear Xio The purpose of this proposed talk is to explain the audiobook process, be it for ...
You'll Pay For That: Payment Systems, Surveillance, and Dissent Alex Marthews There has been a quiet revolution in payment systems and government power. Government efforts to ...