Facilitators: Difference between revisions

From HOPE Wiki
Line 396: Line 396:
== Talks ==
== Talks ==


{| style="color:green; background-color:#ffffcc;" cellpadding="10" cellspacing="0" border="1"
Please contact your team email address or the volunteer coordinator email (all active volunteers should have these email addresses) to sign up as a talk facilitator. Thanks!
! Talk Title
! volunteer facilitator's name
|-
|       '''DAY 1'''
|
|-
|Hacking a Human Mind in Conversation: Penetrating the Conscious Minds Critical Factor to Elicit a Desired Response
|''your name here''
|-
|Defend Your Own System Through Binary Recompilation
|''your name here''
|-
|Hacktivism Rides Again
|''your name here''
|-
|75,000 FOIA Requests Can't Be Wrong: Lessons From a Decade of Transparency Spelunking
|''Gil Elliot''
|-
|Quantum Encryption
|''your name here''
|-
|Keynote: Cory Doctorow
|''your name here''
|-
|Boot Genie: Hacking and Cheating at Boot Sector Games
|''your name here''
|-
|Advanced Wi-Fi Hacking With $5 Microcontrollers
|''your name here''
|-
|Hacking Society, Hacking Humanity
|''your name here''
|-
|Portal to Tesla's Wardenclyffe Lab
|''your name here''
|-
|Free as in Dirt: In Pursuit of Truly Open Source Physical Objects
|''your name here''
|-
|       '''DAY 2'''
|
|-
|A Death Blow to the Web of Trust
|''your name here''
|-
|Hunting Bugs in Your Sleep - How to Fuzz (Almost) Anything With AFL/AFL++
|''your name here''
|-
|Power to the People: Effective Advocacy for Privacy and Security
|''your name here''
|-
|Fight Back Against Stalkers Online: Tips for Everyone
|''your name here''
|-
|Meet the EFA: A Discussion on Grassroots Organizing for Digital Privacy, Security, Free Expression, Creativity, and Access to Knowledge
|''your name here''
|-
|Keynote: Yeshimabeit Milner
|''your name here''
|-
|Librarians and Crisis Response: The Case of COVID-19 Maker Response
|''your name here''
|-
|How Your Mobile Phone Is Tracking You - and How to Fight Back
|''your name here''
|-
|The Election System - Can We Fix It? Yes, We Can!
|''your name here''
|-
|Anatomy of an Accidental Honeypot
|''your name here''
|-
|One Ring to Surveil Them All: Hacking Amazon Ring to Map Neighborhood Surveillance
|''your name here''
|-
|People Are Not Equal to Bots - or How Researchers Delegitimize Social Movements
|''your name here''
|-
|Back Seat Webdriving via Browser Automation
|''your name here''
|-
|Sex Work as Artistic Practice: A Discussion on Creativity, Digital Freedom and Mutual Aid in the Age of COVID
|''your name here''
|-
|A New Techno-Communication Style (and Meta Media)
|''your name here''
|-
|       '''DAY 3'''
|
|-
|DHS BioWatch: A Failure of Oversight and Accountability
|''your name here''
|-
|Solarpunk, Cyberpunk and Popculture: Technological Narratives tl;dr
|''your name here''
|-
|Censorship Is No Longer Interpreted as Damage (And What We Can Do About It)
|''your name here''
|-
|Hacking a Foreign Lawsuit: Project Gutenbergs Experience, and What It Means for You
|''your name here''
|-
|Keynote: Jaron Lanier
|''your name here''
|-
|Reform or Expire? The Battle to Reauthorize FISA Programs
|''your name here''
|-
|OSINT of Facilities by Physical Reconnaissance
|''your name here''
|-
|How to Hack Your Way in a Comedy Show
|''your name here''
|-
|Hacking Enigma: The Real Story of the "Imitation Game" and Alan Turing
|''your name here''
|-
|Weaknesses in Security Testing
|''your name here''
|-
|A History of Social Engineering: From Mass to Interpersonal to Masspersonal
|''your name here''
|-
|Empathy, Equity, and Sex/Tech at the Margins
|''your name here''
|-
|Let's Have a Board Level Talk (i.e., Hardware Interface Boards)
|''your name here''
|-
|       '''DAY 4'''
|
|-
|Hacking ISO Shipping Container Corner - Mobilizing a TEU in a Way You Never Imagined
|''your name here''
|-
|On Computational Law: Why the History of Computing Could Be the Future of Law
|''your name here''
|-
|HomeBot is Alive! Building a Wi-Fi-enabled, Cloud-based, Tweeting, and SMS-ing Arduino Water Leak Detector - A Basic DIY Project Story
|''your name here''
|-
|iWar and Information Warfare, the Next Phase of Internet Motility: Manipulation Inherent to the Internet's DNA
|''your name here''
|-
|The Hackbase Revolution
|''your name here''
|-
|Keynote: Richard Thieme
|''your name here''
|-
|Hacking Web Servers to Make Them More Secure and Faster Using Open Standards
|''your name here''
|-
|Beyond End-to-End
|''your name here''
|-
|On Doing Good Enough
|''your name here''
|-
|Hackers and the Arms Race for Privacy
|''your name here''
|-
|Launching the Cyrillic IDN TLD as the first Internationalized Domain Name in the World
|''your name here''
|-
|Mobile First Digital Identities and Your Privacy
|''your name here''
|-
|Hacking Fake News: How Hackers Can Help Fact Checkers
|''your name here''
|-
|How Much Food Coloring Can Your Robot Handle? An Intro to Poisoning Machine Learning Systems
|''your name here''
|-
|The Battle for Our Emotions... Control the Narrative, Control the People
|''your name here''
|-
|       '''DAY 5'''
|
|-
|DIY Learning COVID-19
|''your name here''
|-
|Hacking Cancer: A Personal Odyssey With Death"
|''your name here''
|-
|Makerspaces Hacking the Space Industry by Enabling Effective Cross-Industry Collaboration and Enhancing the Space Workforce Development
|''your name here''
|-
|Ring's Wrongs: Surveillance Capitalism, Law Enforcement Contracts, and User Tracking
|''your name here''
|-
|Saving Hacking From the Zaibatsus: A Memoir
|''your name here''
|-
|Keynote: Idalin Bobé
|''your name here''
|-
|We Need to Talk About Amazon: An Introduction to Capitalism
|''your name here''
|-
|Inside Job: Exploiting Alarm Systems and the People Who Monitor Them
|''your name here''
|-
|Brain Backups: What's My Brain Got to Do With Me?
|''your name here''
|-
|Bildschirmtext
|''your name here''
|-
|Be Kind to the N00bz: Effective Knowledge and Resource Sharing
|''your name here''
|-
|ProjectMF 2.0 with NPSTN
|''your name here''
|-
|How Asian Makers Unite During COVID-19 (Practices From Japan, Malaysia, and China)
|''your name here''
|-
|Hackers in a Post Roe v. Wade World
|''your name here''
|-
|SE for Introverts: A Proposed Handbook
|''your name here''
|-
|       '''DAY 6'''
|
|-
|The Pocket Organ: An Open Source Musical Instrument
|''your name here''
|-
|20 Years of Scary Technology: City Tech's "Gravesend Inn"
|''your name here''
|-
|How to Turn Your Hacking Skills Into a Career
|''your name here''
|-
|Trust, but Verify: Maintaining Democracy In Spite of ?????????????? ?????????
|''your name here''
|-
|Irregulators v FCC: The Trillion Dollar Broadband and Accounting Scandal
|''your name here''
|-
|Keynote: Tiffany Rad
|''your name here''
|-
|When Cops Get Hacked: Lessons (Un)Learned from a Decade of Law Enforcement Breaches
|''your name here''
|-
|QubesOS for Organizational Security Auditing
|''your name here''
|-
|Fakes Aren't Funny -- or Are They?
|''your name here''
|-
|Introduction to Locksmithing
|''your name here''
|-
|Introducing *DAS: A Framework for Certifying Hacker Knowledge
|''your name here''
|-
|Source Code to the Human Mind - The Science Behind Social Engineering
|''your name here''
|-
|Queering Tech
|''your name here''
|-
|Hackers and the Gnostic Tradition
|''your name here''
|-
|Ask A Sex Geek: Hacking + Human Sexuality
|''your name here''
|-
|       '''DAY 7'''
|
|-
|Polygraph "Tests" and How to Beat Them
|''your name here''
|-
|A Hacker's Toolkit for Global Travel (Or, How to Travel Anywhere on Airline Miles)
|''your name here''
|-
|Securing a Remote Workforce in the Face of COVID-19 and Planning for the Future
|''your name here''
|-
|Who Has Your Face? The Fight Against U.S. Government Agencies' Use of Face Recognition
|''your name here''
|-
|Clearview AI: The Shady Company Tracking Your Face Online
|''your name here''
|-
|Keynote: Flavio Aggio
|''your name here''
|-
|From Cyber Stalking to Spyware - What Do We Know About Stalkerware in Intimate Partner Violence Situations?
|''your name here''
|-
|2020 Elections: What to Expect
|''your name here''
|-
|Hybrid Attacks - Becoming the Stainless Steel Rat
|''your name here''
|-
|Pricing and Mapping the Underground Economy: An Analysis of Contracts on the Biggest Online Hacking Forum
|''your name here''
|-
|Sex, Big Data, and User Autonomy
|''your name here''
|-
|Pick Better Fights With Your Boss
|''your name here''
|-
|The Wonderful World of Cocktail Robotics
|''your name here''
|-
|No One Can Predict the Future
|''your name here''
|-
|Intro to Game Hacking on the NES
|''Gil Elliot''
|-
|       '''DAY 8'''
|
|-
|Weeding Data Space
|''your name here''
|-
|Secure or Get Compromised: Unveiling the Web Security in IoT Devices
|''your name here''
|-
|Updates on I-star Organizations From the Bullshit Police
|''your name here''
|-
|Ask the EFF: The Year in Digital Civil Liberties
|''your name here''
|-
|Keynote: Libby Liu
|''your name here''
|-
|Signalbots: Secrets Distribution and Social Graph Protection for Activists
|''your name here''
|-
|Principles of Digital Autonomy
|''your name here''
|-
|The SecureDrop Journalist Workstation: Handling Anonymous Submissions With Qubes OS
|''your name here''
|-
|Fake Faces
|''your name here''
|-
|Resistance to NSA-Level Global Adversaries With the Nym MixNet
|''your name here''
|-
|A Decepticon and Autobot Walk Into a Bar: A *New* Python Tool for Enhanced OPSEC
|''your name here''
|-
|Cybersecurity and Clown
|''your name here''
|-
|       '''DAY 9'''
|
|-
|Stop Botting My Baby: How to Protect Your New Streaming Platform from Malicious Automation
|''your name here''
|-
|#RFC 1984 - or Why You Should Start Worrying About Encryption Backdoors and Mass Data Collection
|''your name here''
|-
|PolySense: Reverse Engineering Flex Sensors, and Destroying Your Kitchen With Chemistry for Electrical Functionalization of Everyday Objects
|''your name here''
|-
|The Privacy of 100+ Million Children, Families, and Young Adults Is Unprotected
|''your name here''
|-
|Inside the Fight for the Right to Repair: How Tractor Hacking Was Legalized
|''your name here''
|-
|Keynote: Cindy Cohn
|''your name here''
|-
|Zbay, Fighting FAANG, and the Quest for a Peer-To-Peer Messaging App That "Just Works"
|''your name here''
|-
|Experiences in Sharing Digital Security Workshops in an Autonomous and Open Hackerspace in Mexico
|''your name here''
|}

Revision as of 13:21, 23 July 2020

We need volunteers to facilitate for talks, workshops, and for Hackers Got Talent

We need one volunteer facilitator for every workshop and talk, as well as the two Hackers Got Talent events.
If you can facilitate for any of the presentations, please add your name in the table.
If editing wiki pages isn't your thing, then please email <volunteers@hope.net> and let us know which workshop, talk or HGT event you would like to facilitate for.

The basics of this workshop helper role:

  • Arrive in the meeting "room" 10-20 minutes before the workshop starts to meet with the presenter
  • Provide or seek technical support if the presenter is having any issues or has requests
  • During the workshop, monitor the room chat, and help attendees if you are able
  • If there are issues, help to address them, or raise them with the appropriate team (technical issues, behavioral issues)
  • For long-running workshops, it might not be necessary to stay for the whole thing (but it would be great if you could), once everything is working smoothly

Workshops

Start time End time Workshop Title volunteer facilitator's name
       ************ DAY 1 ************
9:00am 1:00pm Incident Response and the ATT&CK Matrix your name here
1:00pm 4:00pm The HoneyDB Honeypot Workshop your name here
4:00pm 5:00pm Four Steps to FOIA Mastery (1) Gil Elliot
5:00pm 6:00pm How to Develop a Map Based UI Using Javascript your name here
6:00pm 7:00pm Inventory Management Playground (1) your name here
7:00pm 8:30pm Surveillance Capitalism, Predictive Analysis, and You (1) Julie Carlene
8:30pm 9:30pm NO WORKSHOP
9:30pm 11:30pm Using the ACTFOIA Methodology to Promote Transparency Around the World your name here
       ************ DAY 2 ************
9:00am 10:30am Evolve Beyond Grade-Based Education and Support Virtual Learning Communities With a Spreadsheet your name here
10:30am 12:00pm Mating Online (with Mate Tea) (1) your name here
12:00pm 4:00pm Securing Web Apps your name here
4:00pm 6:00pm How to Get Published in 2600 (Or Anything Else) your name here
6:00pm 11:00pm Hands-On With Wi-Fi Hacking on the ESP8266 your name here
       ************ DAY 3 ************
9:00am 1:00pm Introduction to Attack Techniques your name here
1:00pm 2:00pm How We Made a Queer "City-Walk" Film During a Pandemic your name here
2:00pm 3:00pm Robots, Science, and Artistic Revolutionary Practices your name here
3:00pm 4:00pm Let's Build a New Hackerspaces.org! A Discussion and Workgroup (1) your name here
4:00pm 6:00pm Building a Home Lab and Introduction to Web Application Hacking your name here
6:00pm 11:00pm Create Your Own Wi-Fi Connected Open Source USB Rubber Ducky your name here
       ************ DAY 4 ************
9:00am 3:00pm OSINT Primer your name here
3:00pm 4:00pm Let's Build a New Hackerspaces.org! A Discussion and Workgroup (2) your name here
4:00pm 5:00pm Effective Meeting Design and Facilitation: Yes, Even Hackers Need to Run Meetings your name here
5:00pm 6:00pm Intelligence Analysis 101 John C. Checco
6:00pm 11:00pm Design Your Own Digispark USB Attack Tool your name here
       ************ DAY 5 ************
9:00am 1:00pm COBOL CTF your name here
1:00pm 2:30pm Build Your GOVERNANCE.md File With CommunityRule your name here
2:30pm 4:30pm Launch Your Own Website Phishing Attacks your name here
4:30pm 5:30pm How to Motivate Hackers and Fight COVID-19 With Botnets your name here
5:30pm 6:30pm Four Steps to FOIA Mastery (2) your name here
6:30pm 7:30pm A Newsroom of Two: Your Computer and You your name here
7:30pm 8:30pm Create Your Portable CentOS Homelab in About an Hour your name here
8:30pm 11:30pm Teaching an Arduino to Think your name here
11:30pm 12:30am Hackers in a Post Roe v. Wade World (workshop) your name here
       ************ DAY 6 ************
9:00am 1:00pm Go the Wrong Way John C. Checco
1:00pm 2:00pm How to Start Contributing Open Source: Examples From the Apache Software Foundation your name here
2:00pm 3:30pm Introduction to Modular Synthesis Using VCV Rack your name here
3:30pm 5:30pm D-I-Yerba Mate Soda - How to Brew Mate Soda at Home your name here
5:30pm 7:00pm MADDES Secret Lair your name here
7:00pm 8:30pm Hidden in Plain Text: An Introduction to PGP/GPG Encryption (1) your name here
8:30pm 10:00pm How to Prove and Assess Quality Learning (With \*DAS) (1) your name here
10:00pm 11:00pm Build an Easy Ventilator your name here
       ************ DAY 7 ************
9:00am 12:00pm Artistic PCB Design for Terrified Beginners your name here
12:00pm 2:00pm Hands-On Introduction to Apache Beam your name here
2:00pm 3:00pm Python + Telnet = Muhahahha!!! your name here
5:00pm 6:30pm Surveillance Capitalism, Predictive Analysis, and You (2) your name here
6:30pm 8:30pm Password Superpowers: How to Crack Hashes and Stump Hackers your name here
8:30pm 10:00pm How to Prove and Assess Quality Learning (With \*DAS) (2) your name here
10:00pm 11:00pm DIY Fabric Mask with Laser Cutting your name here
       ************ DAY 8 ************
9:00am 10:30am A Brief Introduction to GNU Screen: How to Make the Command Line Work for You your name here
10:30am 2:00pm Arduino for Total Newbies your name here
2:00pm 4:30pm ArduTouch Music Synthesizer your name here
4:30pm 6:00pm Hidden in Plain Text: An Introduction to PGP/GPG Encryption (2) your name here
6:00pm 7:00pm Inventory Management Playground (2) your name here
7:00pm 8:30pm Custom Electronics + Activism in K-12 Education by MakeFashion Edu your name here
8:30pm 10:00pm Weaving The Future your name here
10:00pm 11:00pm Glow in the (Edible) Dyes (2) your name here
       ************ DAY 9 ************
9:00am 10:30am Mating Online (with Mate Tea) (2) your name here
10:30am 12:00pm Free Speech Zero Day: Fascists Are Abusing It, Corporations Exploit It - How Do We Take It Back? your name here
12:00pm 1:30pm Machine Learning for Anyone your name here
1:30pm 3:30pm World Wide Wars: Introduction to Exploiting Web Applications your name here

Hackers Got Talent

Start time End time Title volunteer facilitator's name
       ************ NIGHT 1 ************
10:00pm 11:59pm Hackers Got Talent -- Night 1 your name here
       ************ NIGHT 8 ************
10:00pm 11:59pm Hackers Got Talent -- Night 8 your name here

Talks

Please contact your team email address or the volunteer coordinator email (all active volunteers should have these email addresses) to sign up as a talk facilitator. Thanks!