HOPE X

    Vídeos de la HOPE X

    hopex_web_topbar_b.png

    La conferencia sobre hacking HOPE (Hackers On Planet Earth) X se celebró en julio del 2014. Esta conferencia se celebra cada 2 años y es una de las más antiguas, su primera celebración fue en 1994. Este año se celebrará en julio la HOPE XI. Con motivo de ello, hace unos días que se publicaron todos los vídeos de la última celebrada. Hace algún tiempo pusieron disponible el audio de las charlas.

    Jan 9, 2016
    HackingConferenciavideosSeguridad

    Audio de las charlas de la HOPE X

    hopex_web_topbar_b.png

    Los organizadores de la HOPE X han puesto disponible el audio de todas las charlas que se dieron lugar. Si quieres los vídeos, puedes comprarlos online.

    HOPE X se dio lugar en Nueva York los pasados 18-20 de julio.

    Aquí como de costumbre os dejamos las lista con todas las charlas:

    • A Conversation with Edward Snowden - 16kbps - 128kbps
    • Keynote Address – Daniel Ellsberg - 16kbps - 128kbps
    • The Hacker Wars – A Conversation with NSA Whistleblower Thomas Drake - 16kbpsThe Hacker Wars - 128kbps
    • #radBIOS: Yelling a Database across the Room - 16kbps - 128kbps
    • (Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance - 16kbps - 128kbps
    • A Beautiful Mosaic: How to Use FOIA to Fight Secrecy, Explore History, and Strengthen American Democracy - 16kbps - 128kbps
    • A Sea of Parts - 16kbps - 128kbps
    • A Story of Self Publishing Success - 16kbps - 128kbps
    • Apophenia: Hunting for the Ghost in the Machine - 16kbps - 128kbps
    • Are You Ready to SIP the Kool-Aid? - 16kbps - 128kbps
    • Art under Mass Surveillance - 16kbps - 128kbps
    • Ask the EFF – This Year on the Internet - 16kbps - 128kbps
    • Barrett Brown and Anonymous: Persecution of Information Activists - 16kbps - 128kbps
    • Biohacking and DIYbiology North of the 45th Parallel - 16kbps - 128kbps
    • Bless the Cops and Keep Them Far from Us: Researching, Exploring, and Publishing Findings While Staying out of Legal Trouble - 16kbps - 128kbps
    • Blinding The Surveillance State - 16kbps - 128kbps
    • Bootkits: Step-by-Step - 16kbps - 128kbps
    • Bringing Down the Biological System: How Poisons Hack the Body - 16kbps - 128kbps
    • Building an Open Source Cellular Network at Burning Man - 16kbps - 128kbps
    • Can You Patent Software? - 16kbps - 128kbps
    • Closing Ceremonies - 16kbps - 128kbps
    • Codesigning Countersurveillance - 16kbps - 128kbps
    • Community Infrastructure for FOSS Projects - 16kbps - 128kbps
    • Community Owned and Operated Cellular Networks in Rural Mexico - 16kbps - 128kbps
    • Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs - 16kbps - 128kbps
    • Cultures of Open Source: A Cross-Cultural Analysis - 16kbps - 128kbps
    • Cyber Security in Humanitarian Projects as a Social Justice Issue - 16kbps - 128kbps
    • Dark Mail - 16kbps - 128kbps
    • Disruptive Wearable Technology - 16kbps - 128kbps
    • DIY Usability Research: A Crash Course in Guerrilla Data Gathering - 16kbps - 128kbps
    • Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists - 16kbps - 128kbps
    • Echoes of Returns Lost: The History of The Telecom Digest - 16kbps - 128kbps
    • Electric Waste Orchestra: Learning and Teaching Music, Electronics, Programming, and Repurposing - 16kbps - 128kbps
    • Elevator Hacking: From the Pit to the Penthouse - 16kbps - 128kbps
    • Ergonomic Human Interface Hacking - 16kbps - 128kbps
    • Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era - 16kbps - 128kbps
    • Fuckhackerfucks! An Audience Bashing - 16kbps - 128kbps
    • G-code: The Programming Language of Machining and 3D Printers - 16kbps - 128kbps
    • Hacking Money, from Alexander the Great to Zerocoin - 16kbps - 128kbps
    • Hacking the Patent System: The Vulnerabilities That Allow for Bad Patents and How to Stop Them - 16kbps - 128kbps
    • Hearses and Hand-Held Calculators: The Unlikely Connections That Shaped Modern Technology and Tech Culture - 16kbps - 128kbps
    • How to Prevent Security Afterthought Syndrome - 16kbps - 128kbps
    • HTTP Must Die - 16kbps - 128kbps
    • I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence - 16kbps - 128kbps
    • Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices - 16kbps - 128kbps
    • Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit - 16kbps - 128kbps
    • Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014 - 16kbps - 128kbps
    • Lessons Learned from Implementing Real Life Whistleblowing Platforms - 16kbps - 128kbps
    • Lockpicking, a Primer - 16kbps - 128kbps
    • Media, Popular Misconceptions, and the CSI Effect – What Does It Mean for InfoSec and Tech Policy? - 16kbps - 128kbps
    • Movie: “Algorithm” - 16kbps - 128kbps
    • Movie: “Die Gstettensaga: The Rise of Echsenfriedl” - 16kbps - 128kbps
    • Movie: “The Internet’s Own Boy: The Story of Aaron Swartz” - 16kbps - 128kbps
    • Movie: “War on Whistleblowers: Free Press and the National Security State” - 16kbps - 128kbps
    • North Korea – Using Social Engineering and Concealed Electronic Devices to Gather Information in the World’s Most Restrictive Nation - 16kbps - 128kbps
    • Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack - 16kbps - 128kbps
    • Per Speculum In Ænigmate - 16kbps - 128kbps
    • Postprivacy: A New Approach to Thinking about Life in the Digital Sphere - 16kbps - 128kbps
    • PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It - 16kbps - 128kbps
    • Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, and the Advertising-Funded Web - 16kbps - 128kbps
    • Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex - 16kbps - 128kbps
    • Reverse Engineering – Unlocking the Locks - 16kbps - 128kbps
    • Rickrolling Your Neighbors with Google Chromecast - 16kbps - 128kbps
    • Screening: “Nowhere to Hide” (working title: “Rambam Gets His Man”) - 16kbps - 128kbps
    • SecureDrop: A WikiLeaks in Every Newsroom - 16kbps - 128kbps
    • Securing a Home Router - 16kbps - 128kbps
    • Shortwave Pirate Radio and Oddities of the Spectrum - 16kbps - 128kbps
    • Showing Keys in Public – What Could Possibly Go Wrong? - 16kbps - 128kbps
    • Skeuomorphic Steganography - 16kbps - 128kbps
    • Social Engineering - 16kbps - 128kbps
    • Solve the Hard Problem - 16kbps - 128kbps
    • Spy Improv: Ask Me Anything - 16kbps - 128kbps
    • SSL++: Tales of Transport-Layer Security at Twitter - 16kbps - 128kbps
    • Steepest Dissent: Small Scale Digital Fabrication - 16kbps - 128kbps
    • Stupid Whitehat Tricks - 16kbps - 128kbps
    • Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching - 16kbps - 128kbps
    • Teaching Electronic Privacy and Civil Liberties to Government - 16kbps - 128kbps
    • Technology and Jamming of XKEYSCORE - 16kbps - 128kbps
    • The Hidden World of Game Hacking - 16kbps - 128kbps
    • The Internet Society Speaks – The History, Futures, and Alternate Directions of the Internet and Its Governance - 16kbps - 128kbps
    • The Many Faces of LockSport - 16kbps - 128kbps
    • The Repair Movement - 16kbps - 128kbps
    • The Science of Surveillance - 16kbps - 128kbps
    • The Sex Geek as Culture Hacker - 16kbps - 128kbps
    • The Web Strikes Back – Fighting Mass Surveillance with Open Standards - 16kbps - 128kbps
    • This Is the X You Are Looking For - 16kbps - 128kbps
    • Threat Modeling and Security Test Planning - 16kbps - 128kbps
    • Thwarting the Peasants: A Guided and Rambunctious Tour Through the 2600 DeCSS Legal Files - 16kbps - 128kbps
    • Travel Hacking with The Telecom Informer - 16kbps - 128kbps
    • Unmasking a CIA Criminal - 16kbps - 128kbps
    • Updates from the Online Identity Battlefield - 16kbps - 128kbps
    • Usable Crypto: New Progress in Web Cryptography - 16kbps - 128kbps
    • Using Travel Routers to Hide in Safety - 16kbps - 128kbps
    • Vigilante Justice: Masks, Guns, and Networks - 16kbps - 128kbps
    • Visualization for Hackers: Why It’s Tricky, and Where to Start - 16kbps - 128kbps
    • When Confidentiality and Privacy Conflict - 16kbps - 128kbps
    • When Whistleblowers Are Branded as Spies: Edward Snowden, Surveillance, and Espionage - 16kbps - 128kbps
    • When You Are the Adversary - 16kbps - 128kbps
    • Why the Future is Open Wireless - 16kbps - 128kbps
    • Will It Blend? How Evil Software Clogs the Pipes - 16kbps - 128kbps
    • Wireless Meshnets: Building the Next Version of the Web - 16kbps - 128kbps
    • You’ve Lost Privacy, Now They’re Taking Anonymity (aka Whistleblowing is Dead – Get Over It) - 16kbps - 128kbps
    • Your Right to Whisper: LEAP Encryption Access Project - 16kbps - 128kbps
    Aug 12, 2014
    HackingConferenciaSeguridad