Facilitators: Difference between revisions
From HOPE Wiki
No edit summary |
|||
Line 21: | Line 21: | ||
|- | |- | ||
|Four Steps to FOIA Mastery (1) | |Four Steps to FOIA Mastery (1) | ||
|'' | |''Gil Elliot'' | ||
|- | |- | ||
|How to Develop a Map Based UI Using Javascript | |How to Develop a Map Based UI Using Javascript |
Revision as of 20:04, 22 July 2020
We need volunteers to facilitate for talks, workshops, and for Hackers Got Talent
We need one volunteer facilitator for every workshop and talk, as well as the two Hackers Got Talent events.
If you can facilitate for any of the presentations, please add your name in the table.
If editing wiki pages isn't your thing, then please email <volunteers@hope.net> and let us know which workshop, talk or HGT event you would like to facilitate for.
Workshops
Workshop Title | volunteer facilitator's name |
---|---|
DAY 1 | |
Incident Response and the ATT&CK Matrix | your name here |
The HoneyDB Honeypot Workshop | your name here |
Four Steps to FOIA Mastery (1) | Gil Elliot |
How to Develop a Map Based UI Using Javascript | your name here |
Inventory Management Playground (1) | your name here |
Surveillance Capitalism, Predictive Analysis, and You (1) | your name here |
Glow in the (Edible) Dyes (1) | your name here |
Using the ACTFOIA Methodology to Promote Transparency Around the World | your name here |
DAY 2 | |
Evolve Beyond Grade-Based Education and Support Virtual Learning Communities With a Spreadsheet | your name here |
Mating Online (with Mate Tea) (1) | your name here |
Securing Web Apps | your name here |
How to Get Published in 2600 (Or Anything Else) | your name here |
Hands-On With Wi-Fi Hacking on the ESP8266 | your name here |
DAY 3 | |
Introduction to Attack Techniques | your name here |
How We Made a Queer "City-Walk" Film During a Pandemic | your name here |
Robots, Science, and Artistic Revolutionary Practices | your name here |
Let's Build a New Hackerspaces.org! A Discussion and Workgroup (1) | your name here |
Building a Home Lab and Introduction to Web Application Hacking | your name here |
Create Your Own Wi-Fi Connected Open Source USB Rubber Ducky | your name here |
DAY 4 | |
OSINT Primer | your name here |
Let's Build a New Hackerspaces.org! A Discussion and Workgroup (2) | your name here |
Effective Meeting Design and Facilitation: Yes, Even Hackers Need to Run Meetings | your name here |
Intelligence Analysis 101 | your name here |
Design Your Own Digispark USB Attack Tool | your name here |
DAY 5 | |
COBOL CTF | your name here |
Build Your GOVERNANCE.md File With CommunityRule | your name here |
Launch Your Own Website Phishing Attacks | your name here |
How to Motivate Hackers and Fight COVID-19 With Botnets | your name here |
Four Steps to FOIA Mastery (2) | your name here |
A Newsroom of Two: Your Computer and You | your name here |
Create Your Portable CentOS Homelab in About an Hour | your name here |
Teaching an Arduino to Think | your name here |
Hackers in a Post Roe v. Wade World (workshop) | your name here |
DAY 6 | |
Go the Wrong Way | your name here |
How to Start Contributing Open Source: Examples From the Apache Software Foundation | your name here |
Introduction to Modular Synthesis Using VCV Rack | your name here |
D-I-Yerba Mate Soda - How to Brew Mate Soda at Home | your name here |
MADDES Secret Lair | your name here |
Hidden in Plain Text: An Introduction to PGP/GPG Encryption (1) | your name here |
How to Prove and Assess Quality Learning (With \*DAS) (1) | your name here |
Build an Easy Ventilator | your name here |
DAY 7 | |
Artistic PCB Design for Terrified Beginners | your name here |
Hands-On Introduction to Apache Beam | your name here |
Python + Telnet = Muhahahha!!! | your name here |
Surveillance Capitalism, Predictive Analysis, and You (2) | your name here |
Password Superpowers: How to Crack Hashes and Stump Hackers | your name here |
How to Prove and Assess Quality Learning (With \*DAS) (2) | your name here |
DIY Fabric Mask with Laser Cutting | your name here |
DAY 8 | |
A Brief Introduction to GNU Screen: How to Make the Command Line Work for You | your name here |
Arduino for Total Newbies | your name here |
ArduTouch Music Synthesizer | your name here |
Hidden in Plain Text: An Introduction to PGP/GPG Encryption (2) | your name here |
Inventory Management Playground (2) | your name here |
Custom Electronics + Activism in K-12 Education by MakeFashion Edu | your name here |
Weaving The Future | your name here |
Glow in the (Edible) Dyes (2) | your name here |
DAY 9 | |
Mating Online (with Mate Tea) (2) | your name here |
Free Speech Zero Day: Fascists Are Abusing It, Corporations Exploit It - How Do We Take It Back? | your name here |
Machine Learning for Anyone | your name here |
World Wide Wars: Introduction to Exploiting Web Applications | your name here |
Hackers Got Talent
Title | volunteer facilitator's name |
---|---|
Night 1 | |
Hackers Got Talent -- Night 1 | your name here |
Night 8 | |
Hackers Got Talent -- Night 1 | your name here |
Talks
Talk Title | volunteer facilitator's name |
---|---|
DAY 1 | |
Hacking a Human Mind in Conversation: Penetrating the Conscious Minds Critical Factor to Elicit a Desired Response | your name here |
Defend Your Own System Through Binary Recompilation | your name here |
Hacktivism Rides Again | your name here |
75,000 FOIA Requests Can't Be Wrong: Lessons From a Decade of Transparency Spelunking | your name here |
Quantum Encryption | your name here |
Keynote: Cory Doctorow | your name here |
Boot Genie: Hacking and Cheating at Boot Sector Games | your name here |
Advanced Wi-Fi Hacking With $5 Microcontrollers | your name here |
Hacking Society, Hacking Humanity | your name here |
Portal to Tesla's Wardenclyffe Lab | your name here |
Free as in Dirt: In Pursuit of Truly Open Source Physical Objects | your name here |
DAY 2 | |
A Death Blow to the Web of Trust | your name here |
Hunting Bugs in Your Sleep - How to Fuzz (Almost) Anything With AFL/AFL++ | your name here |
Power to the People: Effective Advocacy for Privacy and Security | your name here |
Fight Back Against Stalkers Online: Tips for Everyone | your name here |
Meet the EFA: A Discussion on Grassroots Organizing for Digital Privacy, Security, Free Expression, Creativity, and Access to Knowledge | your name here |
Keynote: Yeshimabeit Milner | your name here |
Librarians and Crisis Response: The Case of COVID-19 Maker Response | your name here |
How Your Mobile Phone Is Tracking You - and How to Fight Back | your name here |
The Election System - Can We Fix It? Yes, We Can! | your name here |
Anatomy of an Accidental Honeypot | your name here |
One Ring to Surveil Them All: Hacking Amazon Ring to Map Neighborhood Surveillance | your name here |
People Are Not Equal to Bots - or How Researchers Delegitimize Social Movements | your name here |
Back Seat Webdriving via Browser Automation | your name here |
Sex Work as Artistic Practice: A Discussion on Creativity, Digital Freedom and Mutual Aid in the Age of COVID | your name here |
A New Techno-Communication Style (and Meta Media) | your name here |
DAY 3 | |
DHS BioWatch: A Failure of Oversight and Accountability | your name here |
Solarpunk, Cyberpunk and Popculture: Technological Narratives tl;dr | your name here |
Censorship Is No Longer Interpreted as Damage (And What We Can Do About It) | your name here |
Hacking a Foreign Lawsuit: Project Gutenbergs Experience, and What It Means for You | your name here |
Keynote: Jaron Lanier | your name here |
Reform or Expire? The Battle to Reauthorize FISA Programs | your name here |
OSINT of Facilities by Physical Reconnaissance | your name here |
How to Hack Your Way in a Comedy Show | your name here |
Hacking Enigma: The Real Story of the "Imitation Game" and Alan Turing | your name here |
Weaknesses in Security Testing | your name here |
A History of Social Engineering: From Mass to Interpersonal to Masspersonal | your name here |
Empathy, Equity, and Sex/Tech at the Margins | your name here |
Let's Have a Board Level Talk (i.e., Hardware Interface Boards) | your name here |
DAY 4 | |
Hacking ISO Shipping Container Corner - Mobilizing a TEU in a Way You Never Imagined | your name here |
On Computational Law: Why the History of Computing Could Be the Future of Law | your name here |
HomeBot is Alive! Building a Wi-Fi-enabled, Cloud-based, Tweeting, and SMS-ing Arduino Water Leak Detector - A Basic DIY Project Story | your name here |
iWar and Information Warfare, the Next Phase of Internet Motility: Manipulation Inherent to the Internet's DNA | your name here |
The Hackbase Revolution | your name here |
Keynote: Richard Thieme | your name here |
Hacking Web Servers to Make Them More Secure and Faster Using Open Standards | your name here |
Beyond End-to-End | your name here |
On Doing Good Enough | your name here |
Hackers and the Arms Race for Privacy | your name here |
Launching the Cyrillic IDN TLD as the first Internationalized Domain Name in the World | your name here |
Mobile First Digital Identities and Your Privacy | your name here |
Hacking Fake News: How Hackers Can Help Fact Checkers | your name here |
How Much Food Coloring Can Your Robot Handle? An Intro to Poisoning Machine Learning Systems | your name here |
The Battle for Our Emotions... Control the Narrative, Control the People | your name here |
DAY 5 | |
DIY Learning COVID-19 | your name here |
Hacking Cancer: A Personal Odyssey With Death" | your name here |
Makerspaces Hacking the Space Industry by Enabling Effective Cross-Industry Collaboration and Enhancing the Space Workforce Development | your name here |
Ring's Wrongs: Surveillance Capitalism, Law Enforcement Contracts, and User Tracking | your name here |
Saving Hacking From the Zaibatsus: A Memoir | your name here |
Keynote: Idalin Bobé | your name here |
We Need to Talk About Amazon: An Introduction to Capitalism | your name here |
Inside Job: Exploiting Alarm Systems and the People Who Monitor Them | your name here |
Brain Backups: What's My Brain Got to Do With Me? | your name here |
Bildschirmtext | your name here |
Be Kind to the N00bz: Effective Knowledge and Resource Sharing | your name here |
ProjectMF 2.0 with NPSTN | your name here |
How Asian Makers Unite During COVID-19 (Practices From Japan, Malaysia, and China) | your name here |
Hackers in a Post Roe v. Wade World | your name here |
SE for Introverts: A Proposed Handbook | your name here |
DAY 6 | |
The Pocket Organ: An Open Source Musical Instrument | your name here |
20 Years of Scary Technology: City Tech's "Gravesend Inn" | your name here |
How to Turn Your Hacking Skills Into a Career | your name here |
Trust, but Verify: Maintaining Democracy In Spite of ?????????????? ????????? | your name here |
Irregulators v FCC: The Trillion Dollar Broadband and Accounting Scandal | your name here |
Keynote: Tiffany Rad | your name here |
When Cops Get Hacked: Lessons (Un)Learned from a Decade of Law Enforcement Breaches | your name here |
QubesOS for Organizational Security Auditing | your name here |
Fakes Aren't Funny -- or Are They? | your name here |
Introduction to Locksmithing | your name here |
Introducing *DAS: A Framework for Certifying Hacker Knowledge | your name here |
Source Code to the Human Mind - The Science Behind Social Engineering | your name here |
Queering Tech | your name here |
Hackers and the Gnostic Tradition | your name here |
Ask A Sex Geek: Hacking + Human Sexuality | your name here |
DAY 7 | |
Polygraph "Tests" and How to Beat Them | your name here |
A Hacker's Toolkit for Global Travel (Or, How to Travel Anywhere on Airline Miles) | your name here |
Securing a Remote Workforce in the Face of COVID-19 and Planning for the Future | your name here |
Who Has Your Face? The Fight Against U.S. Government Agencies' Use of Face Recognition | your name here |
Clearview AI: The Shady Company Tracking Your Face Online | your name here |
Keynote: Flavio Aggio | your name here |
From Cyber Stalking to Spyware - What Do We Know About Stalkerware in Intimate Partner Violence Situations? | your name here |
2020 Elections: What to Expect | your name here |
Hybrid Attacks - Becoming the Stainless Steel Rat | your name here |
Pricing and Mapping the Underground Economy: An Analysis of Contracts on the Biggest Online Hacking Forum | your name here |
Sex, Big Data, and User Autonomy | your name here |
Pick Better Fights With Your Boss | your name here |
The Wonderful World of Cocktail Robotics | your name here |
No One Can Predict the Future | your name here |
Intro to Game Hacking on the NES | your name here |
DAY 8 | |
Weeding Data Space | your name here |
Secure or Get Compromised: Unveiling the Web Security in IoT Devices | your name here |
Updates on I-star Organizations From the Bullshit Police | your name here |
Ask the EFF: The Year in Digital Civil Liberties | your name here |
Keynote: Libby Liu | your name here |
Signalbots: Secrets Distribution and Social Graph Protection for Activists | your name here |
Principles of Digital Autonomy | your name here |
The SecureDrop Journalist Workstation: Handling Anonymous Submissions With Qubes OS | your name here |
Fake Faces | your name here |
Resistance to NSA-Level Global Adversaries With the Nym MixNet | your name here |
A Decepticon and Autobot Walk Into a Bar: A *New* Python Tool for Enhanced OPSEC | your name here |
Cybersecurity and Clown | your name here |
DAY 9 | |
Stop Botting My Baby: How to Protect Your New Streaming Platform from Malicious Automation | your name here |
#RFC 1984 - or Why You Should Start Worrying About Encryption Backdoors and Mass Data Collection | your name here |
PolySense: Reverse Engineering Flex Sensors, and Destroying Your Kitchen With Chemistry for Electrical Functionalization of Everyday Objects | your name here |
The Privacy of 100+ Million Children, Families, and Young Adults Is Unprotected | your name here |
Inside the Fight for the Right to Repair: How Tractor Hacking Was Legalized | your name here |
Keynote: Cindy Cohn | your name here |
Zbay, Fighting FAANG, and the Quest for a Peer-To-Peer Messaging App That "Just Works" | your name here |
Experiences in Sharing Digital Security Workshops in an Autonomous and Open Hackerspace in Mexico | your name here |