Talk Title
|
volunteer facilitator's name
|
DAY 1
|
|
Hacking a Human Mind in Conversation: Penetrating the Conscious Minds Critical Factor to Elicit a Desired Response
|
your name here
|
Defend Your Own System Through Binary Recompilation
|
your name here
|
Hacktivism Rides Again
|
your name here
|
75,000 FOIA Requests Can't Be Wrong: Lessons From a Decade of Transparency Spelunking
|
your name here
|
Quantum Encryption
|
your name here
|
Keynote: Cory Doctorow
|
your name here
|
Boot Genie: Hacking and Cheating at Boot Sector Games
|
your name here
|
Advanced Wi-Fi Hacking With $5 Microcontrollers
|
your name here
|
Hacking Society, Hacking Humanity
|
your name here
|
Portal to Tesla's Wardenclyffe Lab
|
your name here
|
Free as in Dirt: In Pursuit of Truly Open Source Physical Objects
|
your name here
|
DAY 2
|
|
A Death Blow to the Web of Trust
|
your name here
|
Hunting Bugs in Your Sleep - How to Fuzz (Almost) Anything With AFL/AFL++
|
your name here
|
Power to the People: Effective Advocacy for Privacy and Security
|
your name here
|
Fight Back Against Stalkers Online: Tips for Everyone
|
your name here
|
Meet the EFA: A Discussion on Grassroots Organizing for Digital Privacy, Security, Free Expression, Creativity, and Access to Knowledge
|
your name here
|
Keynote: Yeshimabeit Milner
|
your name here
|
Librarians and Crisis Response: The Case of COVID-19 Maker Response
|
your name here
|
How Your Mobile Phone Is Tracking You - and How to Fight Back
|
your name here
|
The Election System - Can We Fix It? Yes, We Can!
|
your name here
|
Anatomy of an Accidental Honeypot
|
your name here
|
One Ring to Surveil Them All: Hacking Amazon Ring to Map Neighborhood Surveillance
|
your name here
|
People Are Not Equal to Bots - or How Researchers Delegitimize Social Movements
|
your name here
|
Back Seat Webdriving via Browser Automation
|
your name here
|
Sex Work as Artistic Practice: A Discussion on Creativity, Digital Freedom and Mutual Aid in the Age of COVID
|
your name here
|
A New Techno-Communication Style (and Meta Media)
|
your name here
|
DAY 3
|
|
DHS BioWatch: A Failure of Oversight and Accountability
|
your name here
|
Solarpunk, Cyberpunk and Popculture: Technological Narratives tl;dr
|
your name here
|
Censorship Is No Longer Interpreted as Damage (And What We Can Do About It)
|
your name here
|
Hacking a Foreign Lawsuit: Project Gutenbergs Experience, and What It Means for You
|
your name here
|
Keynote: Jaron Lanier
|
your name here
|
Reform or Expire? The Battle to Reauthorize FISA Programs
|
your name here
|
OSINT of Facilities by Physical Reconnaissance
|
your name here
|
How to Hack Your Way in a Comedy Show
|
your name here
|
Hacking Enigma: The Real Story of the "Imitation Game" and Alan Turing
|
your name here
|
Weaknesses in Security Testing
|
your name here
|
A History of Social Engineering: From Mass to Interpersonal to Masspersonal
|
your name here
|
Empathy, Equity, and Sex/Tech at the Margins
|
your name here
|
Let's Have a Board Level Talk (i.e., Hardware Interface Boards)
|
your name here
|
DAY 4
|
|
Hacking ISO Shipping Container Corner - Mobilizing a TEU in a Way You Never Imagined
|
your name here
|
On Computational Law: Why the History of Computing Could Be the Future of Law
|
your name here
|
HomeBot is Alive! Building a Wi-Fi-enabled, Cloud-based, Tweeting, and SMS-ing Arduino Water Leak Detector - A Basic DIY Project Story
|
your name here
|
iWar and Information Warfare, the Next Phase of Internet Motility: Manipulation Inherent to the Internet's DNA
|
your name here
|
The Hackbase Revolution
|
your name here
|
Keynote: Richard Thieme
|
your name here
|
Hacking Web Servers to Make Them More Secure and Faster Using Open Standards
|
your name here
|
Beyond End-to-End
|
your name here
|
On Doing Good Enough
|
your name here
|
Hackers and the Arms Race for Privacy
|
your name here
|
Launching the Cyrillic IDN TLD as the first Internationalized Domain Name in the World
|
your name here
|
Mobile First Digital Identities and Your Privacy
|
your name here
|
Hacking Fake News: How Hackers Can Help Fact Checkers
|
your name here
|
How Much Food Coloring Can Your Robot Handle? An Intro to Poisoning Machine Learning Systems
|
your name here
|
The Battle for Our Emotions... Control the Narrative, Control the People
|
your name here
|
DAY 5
|
|
DIY Learning COVID-19
|
your name here
|
Hacking Cancer: A Personal Odyssey With Death"
|
your name here
|
Makerspaces Hacking the Space Industry by Enabling Effective Cross-Industry Collaboration and Enhancing the Space Workforce Development
|
your name here
|
Ring's Wrongs: Surveillance Capitalism, Law Enforcement Contracts, and User Tracking
|
your name here
|
Saving Hacking From the Zaibatsus: A Memoir
|
your name here
|
Keynote: Idalin Bobé
|
your name here
|
We Need to Talk About Amazon: An Introduction to Capitalism
|
your name here
|
Inside Job: Exploiting Alarm Systems and the People Who Monitor Them
|
your name here
|
Brain Backups: What's My Brain Got to Do With Me?
|
your name here
|
Bildschirmtext
|
your name here
|
Be Kind to the N00bz: Effective Knowledge and Resource Sharing
|
your name here
|
ProjectMF 2.0 with NPSTN
|
your name here
|
How Asian Makers Unite During COVID-19 (Practices From Japan, Malaysia, and China)
|
your name here
|
Hackers in a Post Roe v. Wade World
|
your name here
|
SE for Introverts: A Proposed Handbook
|
your name here
|
DAY 6
|
|
The Pocket Organ: An Open Source Musical Instrument
|
your name here
|
20 Years of Scary Technology: City Tech's "Gravesend Inn"
|
your name here
|
How to Turn Your Hacking Skills Into a Career
|
your name here
|
Trust, but Verify: Maintaining Democracy In Spite of ?????????????? ?????????
|
your name here
|
Irregulators v FCC: The Trillion Dollar Broadband and Accounting Scandal
|
your name here
|
Keynote: Tiffany Rad
|
your name here
|
When Cops Get Hacked: Lessons (Un)Learned from a Decade of Law Enforcement Breaches
|
your name here
|
QubesOS for Organizational Security Auditing
|
your name here
|
Fakes Aren't Funny -- or Are They?
|
your name here
|
Introduction to Locksmithing
|
your name here
|
Introducing *DAS: A Framework for Certifying Hacker Knowledge
|
your name here
|
Source Code to the Human Mind - The Science Behind Social Engineering
|
your name here
|
Queering Tech
|
your name here
|
Hackers and the Gnostic Tradition
|
your name here
|
Ask A Sex Geek: Hacking + Human Sexuality
|
your name here
|
DAY 7
|
|
Polygraph "Tests" and How to Beat Them
|
your name here
|
A Hacker's Toolkit for Global Travel (Or, How to Travel Anywhere on Airline Miles)
|
your name here
|
Securing a Remote Workforce in the Face of COVID-19 and Planning for the Future
|
your name here
|
Who Has Your Face? The Fight Against U.S. Government Agencies' Use of Face Recognition
|
your name here
|
Clearview AI: The Shady Company Tracking Your Face Online
|
your name here
|
Keynote: Flavio Aggio
|
your name here
|
From Cyber Stalking to Spyware - What Do We Know About Stalkerware in Intimate Partner Violence Situations?
|
your name here
|
2020 Elections: What to Expect
|
your name here
|
Hybrid Attacks - Becoming the Stainless Steel Rat
|
your name here
|
Pricing and Mapping the Underground Economy: An Analysis of Contracts on the Biggest Online Hacking Forum
|
your name here
|
Sex, Big Data, and User Autonomy
|
your name here
|
Pick Better Fights With Your Boss
|
your name here
|
The Wonderful World of Cocktail Robotics
|
your name here
|
No One Can Predict the Future
|
your name here
|
Intro to Game Hacking on the NES
|
your name here
|
DAY 8
|
|
Weeding Data Space
|
your name here
|
Secure or Get Compromised: Unveiling the Web Security in IoT Devices
|
your name here
|
Updates on I-star Organizations From the Bullshit Police
|
your name here
|
Ask the EFF: The Year in Digital Civil Liberties
|
your name here
|
Keynote: Libby Liu
|
your name here
|
Signalbots: Secrets Distribution and Social Graph Protection for Activists
|
your name here
|
Principles of Digital Autonomy
|
your name here
|
The SecureDrop Journalist Workstation: Handling Anonymous Submissions With Qubes OS
|
your name here
|
Fake Faces
|
your name here
|
Resistance to NSA-Level Global Adversaries With the Nym MixNet
|
your name here
|
A Decepticon and Autobot Walk Into a Bar: A *New* Python Tool for Enhanced OPSEC
|
your name here
|
Cybersecurity and Clown
|
your name here
|
DAY 9
|
|
Stop Botting My Baby: How to Protect Your New Streaming Platform from Malicious Automation
|
your name here
|
#RFC 1984 - or Why You Should Start Worrying About Encryption Backdoors and Mass Data Collection
|
your name here
|
PolySense: Reverse Engineering Flex Sensors, and Destroying Your Kitchen With Chemistry for Electrical Functionalization of Everyday Objects
|
your name here
|
The Privacy of 100+ Million Children, Families, and Young Adults Is Unprotected
|
your name here
|
Inside the Fight for the Right to Repair: How Tractor Hacking Was Legalized
|
your name here
|
Keynote: Cindy Cohn
|
your name here
|
Zbay, Fighting FAANG, and the Quest for a Peer-To-Peer Messaging App That "Just Works"
|
your name here
|
Experiences in Sharing Digital Security Workshops in an Autonomous and Open Hackerspace in Mexico
|
your name here
|