Vídeos de la HOPE X
La conferencia sobre hacking HOPE (Hackers On Planet Earth) X se celebró en julio del 2014. Esta conferencia se celebra cada 2 años y es una de las más antiguas, su primera celebración fue en 1994. Este año se celebrará en julio la HOPE XI. Con motivo de ello, hace unos días que se publicaron todos los vídeos de la última celebrada. Hace algún tiempo pusieron disponible el audio de las charlas.
Si hubo una charla que desató expectación, esa fue la de la conversación con Snowden. No te la pierdas si no la has visto aún.
- The Repair Movement
- Media, Popular Misconceptions, and the CSI Effect
- Barrett Brown and Anonymous: Persecution of Information Activists
- When Whistleblowers Are Branded as Spies
- The Hacker Wars - A Conversation with NSA Whistleblower Thomas Drake
- Lockpicking, a Primer
- The Many Faces of LockSport
- Community Owned and Operated Cellular Networks in Rural Mexico
- Building an Open Source Cellular Network at Burning Man
- SSL++: Tales of Transport-Layer Security at Twitter
- Dark Mail
- Unmasking a CIA Criminal
- Using Travel Routers to Hide in Safety
- Bless the Cops and Keep Them Far from Us
- Ask the EFF - This Year on the Internet
- SecureDrop: A WikiLeaks in Every Newsroom
- Keynote Address - Daniel Ellsberg
- HOPE X (2014:): A Conversation with Edward Snowden
- Disruptive Wearable Technology
- Thwarting the Peasants: The 2600 DeCSS Legal Files
- You've Lost Privacy, Now They're Taking Anonymity
- Biohacking and DIYbiology North of the 45th Parallel
- Social Engineering
- Lessons Learned from Implementing Real Life Whistleblowing Platforms
- Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era
- Elevator Hacking: From the Pit to the Penthouse
- PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It
- Cultures of Open Source: A Cross-Cultural Analysis
- North Korea - Using Social Engineering and Concealed Electronic Devices
- Blinding The Surveillance State
- Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, & Advertising-Funded Web
- Closing Ceremonies
- Are You Ready to SIP the Kool-Aid?
- Solve the Hard Problem
- A Beautiful Mosaic: How to Use FOIA
- Wireless Meshnets: Building the Next Version of the Web
- Apophenia: Hunting for the Ghost in the Machine
- Hacking the Patent System
- Can You Patent Software?
- HTTP Must Die
- The Internet Society Speaks â Internet and Its Governance
- Why the Future is Open Wireless
- Art under Mass Surveillance
- Rickrolling Your Neighbors with Google Chromecast
- How to Prevent Security Afterthought Syndrome
- The Web Strikes Back - Fighting Mass Surveillance with Open Standards
- This Is the X You Are Looking For
- Hearses and Hand-Held Calculators: Unlikely Connections
- (Geo)location, Location, Location: Mobile Location Surveillance
- Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex
- Electric Waste Orchestra: Music, Electronics, Programming, and Repurposing
- Hacking Money, from Alexander the Great to Zerocoin
- When You Are the Adversary
- Showing Keys in Public â What Could Possibly Go Wrong?
- The Hidden World of Game Hacking
- The Sex Geek as Culture Hacker
- Spy Improv: Ask Me Anything (1 of 2)
- Spy Improv: Ask Me Anything (2 of 2)
- Cyber Security in Humanitarian Projects as a Social Justice Issue
- Bringing Down the Biological System: How Poisons Hack the Body
- Teaching Electronic Privacy and Civil Liberties to Government
- Fuckhackerfucks! An Audience Bashing
- Travel Hacking with The Telecom Informer
- Drop It Like Itâs Hot: Secure Sharing and Radical OpSec for Investigative Journalists
- Community Infrastructure for FOSS Projects
- Stupid Whitehat Tricks
- Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit
- Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching
- Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack
- Shortwave Pirate Radio and Oddities of the Spectrum
- Steepest Dissent: Small Scale Digital Fabrication
- When Confidentiality and Privacy Conflict
- Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices
- Per Speculum In Ãnigmate
- G-code: The Programming Language of Machining and 3D Printers
- Postprivacy: A New Approach to Thinking about Life in the Digital Sphere
- Ergonomic Human Interface Hacking
- Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs
- I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence
- Vigilante Justice: Masks, Guns, and Networks
- #radBIOS: Yelling a Database across the Room
- Threat Modeling and Security Test Planning
- Visualization for Hackers: Why Itâs Tricky, and Where to Start
- Usable Crypto: New Progress in Web Cryptography
- Your Right to Whisper: LEAP Encryption Access Project
- Skeuomorphic Steganography
- Reverse Engineering - Unlocking the Locks
- DIY Usability Research: A Crash Course in Guerrilla Data Gathering
- A Sea of Parts
- Codesigning Countersurveillance
- Updates from the Online Identity Battlefield
- Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014
- Will It Blend? How Evil Software Clogs the Pipes
- Bootkits: Step-by-Step
- The Science of Surveillance
- Technology and Jamming of XKEYSCORE
- Securing a Home Router
- A Story of Self Publishing Success
- Echoes of Returns Lost: The History of The Telecom Digest
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec