Version Tomorrow is the first day of the rest of your life
Events
Curated by SHA2017
Title | Track | Speakers | |
---|---|---|---|
1)3\/1532
1)3\/1532 (deviser) is drone/noise/experimental soundscaping. The aural... |
Curated by SHA2017 | ||
45 minute to Browser Super Powers
Do you know that Firefox now have a new technology that simplify the... |
Curated by SHA2017 | ||
Adventures in Spearphishing: The Good, The Bad, and The Ugly
This presentation introduces "phishing spam", an open-source Spearphishing... |
Curated by SHA2017 | ||
A look at TR-06FAIL and other CPE Configuration Management Disasters
In late 2016 a TR-064 (LAN-side CPE management) misconfiguration in a wide... |
Curated by SHA2017 | ||
Ambrassband - Live Concert!
|
Curated by SHA2017 |
|
|
An academic's view to incident response
A timely reaction to security incidents is without doubts important. And... |
Curated by SHA2017 | ||
An autopsy in the IoT - Nabaztag, the Hare
The first inhabitant of IoT, the hare Nabaztag will be the protagonist of the... |
Curated by SHA2017 | ||
Android Application Pentesting 101
Have you ever wondered what kind of vulnerabilities exist in mobile... |
Curated by SHA2017 | ||
An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)
Due to the hunger of many machine learning algorithms computing power of... |
Curated by SHA2017 | ||
Anonymous, secure and easy. You can have them all.
All the pieces to make encryption easy, secure and anonymous are in... |
Curated by SHA2017 | ||
Arduino for kids soldering
This workshop is easy enough for total little newbies to learn all you need... |
Curated by SHA2017 | ||
Are Whistleblowers safer today than they were at OHM2013?
How does the public view whistleblowers? Would they use social media, blogs... |
Curated by SHA2017 | ||
Art Tech Activism Privacy and Cool Robots
Viola van Alphen is activist, writer and former director of multimedia event... |
Curated by SHA2017 | ||
Ask your candidates and let everyone know about it
This talk will show and compare different forms of political campaigns during... |
Curated by SHA2017 | ||
A trip to India
We will take you behind the scenes of a call center that placed over 5... |
Curated by SHA2017 | ||
Attacking OpenSSL using Side-channel Attacks
Side channel attacks (SCA) gained attention in the past years. New low cost... |
Curated by SHA2017 | ||
Automotive microcontrollers. Safety != Security
Tesla Model S, Jeep Cherokee, Mitsubishi Outlander, Nissan Leaf… The list of... |
Curated by SHA2017 | ||
Balloon folding workshop
Balloon folding looks complicated, but actually isn't. If you ever wanted to... |
Curated by SHA2017 | ||
bambi de luxe
|
Curated by SHA2017 |
|
|
Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating Systems & Programming Languages
Over the past year multiple people have been engaging language maintainers... |
Curated by SHA2017 | ||
Best of IoT Fails
The internet of things (IoT) is just at the beginning of its development, but... |
Curated by SHA2017 | ||
Beyond the Titanic
Slowly ignorance over dataleaks are vanishing. We start to accept that there... |
Curated by SHA2017 | ||
Biometric ID cards by the billion
India has rolled out a 'voluntary' biometric ID card to all of its... |
Curated by SHA2017 | ||
Black Hat Locksmithing
From thieves to prison breaks to secret tools, the murky world of the... |
Curated by SHA2017 | ||
Blockchains for a Better World
The blockchain invention allow us to take our freedom back and save the... |
Curated by SHA2017 | ||
Bluetooth enabled Geocache
A geocache is a modern day trasure hunt. Looking for treasure hidden all over... |
Curated by SHA2017 | ||
Brief history of IoT (Internet of Things)
While the IoT buzzword became common in the last four years, in june 2005 a... |
Curated by SHA2017 | ||
Building A Virtual Reality Website using A-Frame
A-Frame is an open-source web framework by Mozilla for easily creating VR... |
Curated by SHA2017 | ||
Building Humanitarian hackers in your communities - How to
This talk will share lessons from the random hacks of kindness community on... |
Curated by SHA2017 | ||
Build your own IoT cloud with MQTT
Using MQTT to connect and use IoT devices |
Curated by SHA2017 | ||
Bypassing Secure Boot using Fault Injection
More and more (secure) embedded systems implement a feature to assure the... |
Curated by SHA2017 | ||
Can quantum physics break cryptography's curse?
The history of cryptography is a history of failures. Stronger ciphers... |
Curated by SHA2017 | ||
Car hacking: getting from A to B with Eve
Car security is, not surprisingly, a hot topic; after all they are fast and... |
Curated by SHA2017 | ||
Certbot & Let's Encrypt Office Hours
You’re trying to turn on https for your site for the first time. You have a... |
Curated by SHA2017 | ||
Commissioning methods for IoT
Many of the things we use on a daily basis are becoming smart and connected.... |
Curated by SHA2017 | ||
Computational Thinking
You will get inspiration how you can teach your kids computational thinking.... |
Curated by SHA2017 | ||
Computer crime and criminal law 101
Legal lecture on Cybercrime for non-legal-experts #Society #Politics |
Curated by SHA2017 | ||
Copyfighters
Copyright is failing young people and their usage of the internet everyday,... |
Curated by SHA2017 | ||
Cryptography beyond Encryption and Signatures
This talk will introduce a couple of less well known applications of... |
Curated by SHA2017 | ||
Cryptokids
Talk by Henk (waag Society) and Evelyn Austin (Bits of... |
Curated by SHA2017 | ||
Cryptowars 2.0: Lessons from the past, for the present
In the 90's there was a political struggle about control of the availability... |
Curated by SHA2017 | ||
Cryptowars 2.0: Simulcast
This is the simulcast of Phil Zimmerman's talk taking place in No. #Society |
Curated by SHA2017 | ||
Cut by the free and open edge
FLOSS seems to be a natural choice for NGOs and not formalized entities... |
Curated by SHA2017 | ||
Cyberbullying: reverse engineering
<p>The workshop focuses on a real case of cyberbullying: participants will... |
Curated by SHA2017 | ||
Data Exploitation
In the world of the "internet of shit" - where it's not just our computers... |
Curated by SHA2017 | ||
DDoS attack and defense
In this talk you'll be given a very technical overview of DDoS and mitigation... |
Curated by SHA2017 | ||
decentralized casual crypto computing
Practical Tools to Enhance Privacy in Clearnet and to Enable/Disseminate... |
Curated by SHA2017 | ||
Demolish the web with the Firefox Dev Tools!
Firefox has amazing dev tools that support the last technologies but they can... |
Curated by SHA2017 | ||
Detecting a breach from an attackers perspective.
Detecting a breach is hard, detecting someone who targets your network... |
Curated by SHA2017 | ||
Developments in Coordinated Vulnerability Disclosure
There has been much development in recent years on vulnerability disclosure.... |
Curated by SHA2017 | ||
Digital dissent in Latin America
The Internet isn't global. Only half of the world is connected to the... |
Curated by SHA2017 | ||
Digital personal locker
Most of our data is held in a fuzzy uncontrollable manner. We propose a... |
Curated by SHA2017 | ||
dj-spock
|
Curated by SHA2017 |
|
|
DNA: More greatest hits
DNA is a vast subject. In the "DNA: Surprise, it is fully digital"... |
Curated by SHA2017 | ||
DNA: The Code of Life
DNA is the code of life. It encodes how we are built, how nature operates.... |
Curated by SHA2017 | ||
Ed Ruskin
|
Curated by SHA2017 |
|
|
Energy Harvesting for Smart Autonomous Electronics 2
Converting ambient energy into electrical energy to power wireless autonomous... |
Curated by SHA2017 | ||
Ethics and the Events of 9-11
Kirk Wiebe will talk about his experiences during his 32 year NSA career,... |
Curated by SHA2017 | ||
Ethics in Technology
When designing technologies, networked systems, and measurements on the... |
Curated by SHA2017 | ||
Exploiting The North American Railways
From 2005 to 2010 I spent my time hopping freight trains all over the United... |
Curated by SHA2017 | ||
Exploiting Twitter with Tinfoleak for investigative purposes
In this talk, I will present a new version of my tool Tinfoleak, the most... |
Curated by SHA2017 | ||
Exploiting Twitter with Tinfoleak for investigative purposes
In this talk, I will present a new version of my tool Tinfoleak, the most... |
Curated by SHA2017 | ||
FaceDancer 2.0
USB connectivity has become ubiquitous. The sheer variety of usb-connected ... |
Curated by SHA2017 | ||
Failure modes of digital radios
All consumer electronics have integrated digital radios. Many with... |
Curated by SHA2017 | ||
Famous C&C servers from inside to outside.
We all are aware of the malware attacks and bot-net's behind this massive... |
Curated by SHA2017 | ||
Fermentation Mobile
This talk is about setting up mobile fermentation education centers for... |
Curated by SHA2017 | ||
FILMS
Last decades I have made 3 films with technological aspects. Since I am not... |
Curated by SHA2017 | ||
Flip Feng Shui
In 2016, the VUSec system security group from Vrije Universiteit Amsterdam... |
Curated by SHA2017 | ||
from glass fiber to fiber glass noodles
Experiments in edible network infrastructures #Experimental |
Curated by SHA2017 | ||
From Project To Kit
A talk outlining the process of turning a personal electronic project into a... |
Curated by SHA2017 | ||
front door nightmare
bypassing electronic locks without RFID hacking. Smart lock’s electronical... |
Curated by SHA2017 | ||
Gems are truly outrageous
This talk demonstrates how to make fake gemstones and related accessories... |
Curated by SHA2017 | ||
General Volunteer Angels Introduction
Welcome aboard SHA2017! Attending a self-organised, community-driven event... |
Curated by SHA2017 |
|
|
Gentoo hardened install party
Gentoo Hardened installations are usually seen as hard in both senses. During... |
Curated by SHA2017 | ||
Get more work area from a CNC machine
This workshop will demonstrate how it is possible to go beyond the initial... |
Curated by SHA2017 | ||
GNU Taler
GNU Taler is an online payment system that uses Chaum's blind signatures to... |
Curated by SHA2017 | ||
Good is hard, but try anyway.
How do we know what good is. Are we creating something worth making? Are we... |
Curated by SHA2017 | ||
GoodLife
|
Curated by SHA2017 |
|
|
Hack-a-ble
Although IoT is already embedded in our everyday lives, our security and... |
Curated by SHA2017 | ||
Hackerspaces Jedi
We use traceroutes to explore and visualise interconnectedness between... |
Curated by SHA2017 | ||
Hacking Behavioral Economics
We will examine through discussion, activities, and break-out groups:... |
Curated by SHA2017 | ||
Hacking on a boat
Modern vessels are equipped with all kinds of electronics, to easy... |
Curated by SHA2017 | ||
Hack North Korea
HRF North Korea Program team will prepare a presentation to educate SHA 2017... |
Curated by SHA2017 | ||
Hands up, don't shoot. Unless with a bodycam.
Dutch police officially started using bodycams eight years ago – although the... |
Curated by SHA2017 | ||
Having Daft Ideas
We've made a lot of daft things, some of which have proved to be quite... |
Curated by SHA2017 | ||
Heralds Introduction
Angels that would like to be a Herald have to attend one of the... |
Curated by SHA2017 | ||
Hormones and Hysteria - what every person should know
I'd like to discuss with your my experience with hormones and perceived... |
Curated by SHA2017 | ||
Hospitals and cyber security
The Hospitals are still very attractive for cyber criminals. Not just because... |
Curated by SHA2017 | ||
How an intern hacked the powergrid
This talk focuses on the thesis assignment of Willem Westerhof. During this... |
Curated by SHA2017 | ||
How hackers could have hacked all Dutch elections since 2009
In this talk I'll present my findings when researching the security of the... |
Curated by SHA2017 | ||
How I made my diesel motorcycle
I have made several diesel powered motorcycles and this is a simple talk or... |
Curated by SHA2017 | ||
How the NSA tracks you
Bill Binney will talk about his experiences as Technical Director at the NSA... |
Curated by SHA2017 | ||
How the NSA Tracks You: Simulcast
This is the simulcast of the talk by Bill Binney taking place in No. |
Curated by SHA2017 | ||
How to Defend Cars
For a long time automobile manufacturers designed their cars as closed... |
Curated by SHA2017 | ||
Human body as an electric IO system
A lecture about the brain as electrical Input Output system (the What the... |
Curated by SHA2017 | ||
Human Rights and Internet Infrastructure
Standards bodies, infrastructure providers, internet governance organizations... |
Curated by SHA2017 | ||
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text... |
Curated by SHA2017 | ||
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text... |
Curated by SHA2017 | ||
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text... |
Curated by SHA2017 | ||
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text... |
Curated by SHA2017 | ||
I have a dream
The ultimate Hackerspace; From Panopticon-prison to... |
Curated by SHA2017 | ||
Improve IT Projects through Audits
How do you secure small, Internet-based businesses that have few ressources... |
Curated by SHA2017 | ||
Improving security with Fuzzing and Sanitizers
A bug in Gstreamer could be used to own a Linux Desktop system. TCPDump... |
Curated by SHA2017 | ||
(In)discrete Music
In which we experiment with generative music, based on chaotic systems and... |
Curated by SHA2017 | ||
"Information. What are they looking at?"
Our barrier-free documentary "Information. What are they looking at?" takes... |
Curated by SHA2017 | ||
Infrastructure review
Infrastructure talk from Productiehuis, NOC and other interested teams.... |
Curated by SHA2017 | ||
Ingo Boss
|
Curated by SHA2017 |
|
|
Internet Poem
Reading performance of the poem, 'internet is as big as your language' aka.... |
Curated by SHA2017 | ||
In The Eye of the Beholder
Capitalist underpinnings of advanced technology development threatens... |
Curated by SHA2017 | ||
Intro to Game Boy hacking
In this workshop will present you with tools and resources to get started... |
Curated by SHA2017 | ||
Invitation to help build Quantum Internet
The goal of Quantum Internet project at TU Delft is to build an... |
Curated by SHA2017 | ||
Joghurt Bambaata
|
Curated by SHA2017 |
|
|
Johannes
|
Curated by SHA2017 |
|
|
LDraw: computer-aided design for serious LEGO fans
LDraw™ is an open standard for LEGO CAD programs that allow the user to... |
Curated by SHA2017 | ||
Lecture Decode: Data-sovereignty back to the citizens
Join this talk on DECODE, a project that provides tools that put individuals... |
Curated by SHA2017 | ||
Legacy Crypto Never Dies
In 2012 I released a DES cracking service with Moxie Marlinspike for cracking... |
Curated by SHA2017 | ||
Let's stop EU copyright expansion
European Commission plans are underway to introduce an extra copyright for... |
Curated by SHA2017 | ||
Let There be Light
The talk aims to be an introduction to LED lighting, how to create lighting... |
Curated by SHA2017 | ||
Life is too short for playing classic sports...
In this presentation, I'll try to convince the audience how the CTF... |
Curated by SHA2017 | ||
Lightning talks day 3
|
Curated by SHA2017 | ||
Lightning talks day 4
|
Curated by SHA2017 | ||
Lightning talks day 5
|
Curated by SHA2017 | ||
Lockpicking and IT Security
What do design flaws, implementation errors, 0days etc. look like in physical... |
Curated by SHA2017 | ||
LoraLight
LoraWan, the communication protocol on top of Lora is being developed and... |
Curated by SHA2017 | ||
Mailpile
Four years ago, in a tent at OHM 2013, the Mailpile project and crowd-funding... |
Curated by SHA2017 | ||
Make your own titanium spork
Attendees will make their own titanium spork, to their own design, cutting it... |
Curated by SHA2017 | ||
Making bombs
We'll make small quantities of hydrogen gas and let them explode. |
Curated by SHA2017 | ||
Malware: From your text editor, to the United States Government's Lab
Ever wonder where your malware ends up after you deploy it? Are you curious... |
Curated by SHA2017 | ||
Mass Surveillance abusing Computational Linguistics and Human Language Technology
Even though the Snowden revelations for the first time clearly show that mass... |
Curated by SHA2017 | ||
Mathematics and Video Games
In this talk, I will talk about some interesting applications of maths to... |
Curated by SHA2017 | ||
MISP threat sharing platform
Information sharing is a key element in detecting security breaches and... |
Curated by SHA2017 | ||
Moldover: Live Electronic Music!
History notes only a handful of artists who successfully pushed the limits -... |
Curated by SHA2017 | ||
Moving towards fully encrypted web
In this talk I'm going to go through the problems people are facing in moving... |
Curated by SHA2017 | ||
My Safe In Your House
All those shiny cloud services sound tempting, but unfortunately they might... |
Curated by SHA2017 | ||
Nerd-Wrangling 101
Neurodiversity is the concept that neurological conditions are variations in... |
Curated by SHA2017 | ||
Network Traffic Analysis using Deep Packet Inspection and Data Visualization
For the protection of (critical) infrastructures against complex virus... |
Curated by SHA2017 | ||
Neuralscape Bowels
The idea of how to transform brainwaves in images and sounds is not new, but... |
Curated by SHA2017 | ||
No Place for Fools
Sergey Astahov is a gay man converted by Church and state propaganda into an... |
Curated by SHA2017 |
|
|
Nothing to Hide
Screening of the documentary film Nothing to Hide (86minutes, with the... |
Curated by SHA2017 | ||
NSFW: Di[CENSORED]s for privacy
History, relevance and future of penis imagery in culture. A radical way... |
Curated by SHA2017 | ||
Off Grid: Disclosing your 0days in a videogame mod
Off Grid is a different kind of hacking game, and it is fully moddable. The... |
Curated by SHA2017 | ||
Off Grid: How to mod and make your own hacks
Following on from the talk 'Disclosing your 0day's in a videogame mod' this... |
Curated by SHA2017 | ||
Off Grid: How to mod and make your own hacks pt.2
Following on from the talk 'Disclosing your 0day's in a videogame mod' and... |
Curated by SHA2017 | ||
Off<>zz Code and Piano Concert
For SHA2017, Off<>zz will present a two part music concert of piano and live... |
Curated by SHA2017 | ||
One map to map them all
The MissingMaps project started almost three years ago. Since then, all over... |
Curated by SHA2017 | ||
On the design of a portable secure filesystem: the crypto bits
In this presentation I will present the cryptographic aspects of a... |
Curated by SHA2017 | ||
Open Band
Open Band, is a project that aims to experience the empowerment of public in... |
Curated by SHA2017 | ||
Open cybertable
Do you have an interest in computer or network security but you need help... |
Curated by SHA2017 | ||
OpenINTEL: digging in the DNS with an industrial size digger
Since early 2015, the University of Twente, SURFnet and SIDN collaborate in... |
Curated by SHA2017 | ||
Open networking and hardware/software disaggregation
Open Networking or "Web scale networking" is the concept where you're no... |
Curated by SHA2017 | ||
Parkour communications
Using encryption and onion routing is all fine and dandy, but both can be... |
Curated by SHA2017 | ||
Physical Penetration Testing
Your pentesting goal: getting the data. You decide to do it physically. How... |
Curated by SHA2017 | ||
Playable Packaging and Custom Musical Interface Design
In this presentation, Moldover will discuss the motivation behind his bespoke... |
Curated by SHA2017 | ||
Playing defence is complicated
What kind of work goes into implementing secure services? Service providers... |
Curated by SHA2017 | ||
Practical techniques for whistleblowers to defend themselves in a hostile digital world
The return of data retention laws in places like Australia (2 year retention... |
Curated by SHA2017 | ||
Privacy Design Strategies
Privacy laws are complex and vague. They offer little concrete guidelines for... |
Curated by SHA2017 | ||
Public speaking for technical people
As a technical person, you work with complicated and often important matters.... |
Curated by SHA2017 | ||
Qubes OS for you and me
Qubes OS challenges the notion that security and usability are mutually... |
Curated by SHA2017 | ||
Qubes User Group
Qubes is a reasonably-secure desktop operating system based on using the Xen... |
Curated by SHA2017 | ||
Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit
CVE-2017-2636 is a 7-year old race condition in the Linux kernel that was... |
Curated by SHA2017 | ||
Rapakivi&Henson
|
Curated by SHA2017 |
|
|
rarenerd
|
Curated by SHA2017 |
|
|
Regulating Law Enforcement use of Trojans
The complexity of implementing a policy (law) and related operational and... |
Curated by SHA2017 | ||
Relationship status of technology and legislation: It's complicated
Legislation is said to be slow to follow technological developments. This not... |
Curated by SHA2017 | ||
Resisting Algorithms of Mass Destruction
When the Australian media use the word “clusterfuck” in headlines describing... |
Curated by SHA2017 | ||
Responsible Disclosure; How to make your school a safer place.
This talk is about the collaboration and Responsible Disclosure in a school... |
Curated by SHA2017 | ||
Rooting the MikroTik routers
In this talk I describe my journey into reverse engineering parts of MikroTik... |
Curated by SHA2017 | ||
Run your own VPN provider
Easy to install and secure VPN service that respects your privacy Public... |
Curated by SHA2017 | ||
Ruud van der Klugt
|
Curated by SHA2017 |
|
|
Seccubus workshop
Seccubus is an open source tool I have written to make my life scanning... |
Curated by SHA2017 | ||
SHA2017 Badge
The SHA2017 Badge overview. #Making |
Curated by SHA2017 | ||
SHA2017 Cardbox Boat Regatta
We will have a cardboxboat race in the harbour, can u make a cardboxboat and... |
Curated by SHA2017 | ||
SHA2017 Closing
A summary extraordinaire. #Community |
Curated by SHA2017 | ||
SHA2017 Closing Simulcast
Simulcast of the Closing Ceremonies #Community |
Curated by SHA2017 | ||
SHA2017 Opening
Welcome to SHA2017! So much camp, everywhere! #Community |
Curated by SHA2017 | ||
SHA2017 Opening Simulcast
This is the overflow simulcast of the SHA2017 Opening Ceremonies #Community |
Curated by SHA2017 | ||
SHOULD I STAY OR SHOULD I GO?
Today’s tech companies have enormous power over what we can access and share,... |
Curated by SHA2017 | ||
Silent Protest
Independent observers are noting a decrease in Freedom of speech worldwide.... |
Curated by SHA2017 | ||
Smart Home Security with Tor
The IoT is emerging as the third wave in the development of the Internet. We... |
Curated by SHA2017 | ||
Smart, safe & happy
Privacy-minded charities have a hard time going up against silicon valley's... |
Curated by SHA2017 | ||
Social Enterprises as a Tool for Activism
We have entered the era of President Trump. Activists, NGOs, and charities... |
Curated by SHA2017 | ||
Software Patents v3.0: the Unitary Patent Court
In July 2005, after several failed attempts to legalise software patents in... |
Curated by SHA2017 | ||
SSH - From Zero to Hero (Workshop)
So you have used SSH from the command line? Even used scp to transfer files.... |
Curated by SHA2017 | ||
Subtle and Not so Subtle Sexism
An open meeting to discuss sexism, large and small. |
Curated by SHA2017 | ||
Symphony of Fire
Location: near No and Pa. Symphony of Fire is the partnership between Uwe... |
Curated by SHA2017 |
|
|
TBM: Trusted boot module
The Trusted Boot Module is an open hardware module that enables all kind of... |
Curated by SHA2017 | ||
TECHNOSHAMANISM
Presentation of the Technoshamanism network. Concepts, practices, festivals,... |
Curated by SHA2017 | ||
The art of creating an escape room
At the moment of submitting this talk there are 500+ escape rooms in The... |
Curated by SHA2017 | ||
The Bucket Boyz - Live Band!
Live Concert! |
Curated by SHA2017 |
|
|
The Campfire
The offical SHA2017 campfire |
Curated by SHA2017 | ||
The Campfire
The offical SHA2017 campfire |
Curated by SHA2017 | ||
The Campfire
The official sha2017 campfire |
Curated by SHA2017 | ||
The Campfire
The offical sha2017 campfire |
Curated by SHA2017 | ||
The Fenrir Project
TLS can be limiting, OAuth is a (somewhat working) mess. What would happen... |
Curated by SHA2017 | ||
The Hackeboy handheld game console
Hackefuffel is a small indie game label of 8-bit-heads from Hamburg. In late... |
Curated by SHA2017 | ||
The Need for Blockchain in International Development
After working for two boot-strapping, innovation fueled startups solving... |
Curated by SHA2017 | ||
The One Ring, goldsmithing workshop
Mobile goldsmithing workshop, We (you!) will make a nice faceted silver ring... |
Curated by SHA2017 | ||
The original Internet of Things - Ropes, Knots and Splices
Ropes and fibres are part of our daily life but the real quality of a good... |
Curated by SHA2017 | ||
The Practical Activist
Not for the faint of heart! This workshop is training to work with very... |
Curated by SHA2017 | ||
The quest for algorithm diversity
Our vision is to increase transparency behind personalization algorithms. <a... |
Curated by SHA2017 | ||
The Security and Privacy Implications of AI and Machine Learning
What will the recent rapid progress in machine learning and AI mean for the... |
Curated by SHA2017 | ||
The Soul Travelers - Live Band!
|
Curated by SHA2017 |
|
|
The state of the pretty Easy privacy (p≡p) project and what to expect next
The pretty Easy privacy (p≡p) project has the primary goal to make encryption... |
Curated by SHA2017 | ||
The World in 24 Hours Revisited
In this talk we look at The World in 24 Hours, an early computer network art... |
Curated by SHA2017 | ||
Time Stretching BpmDj
How to modify the speed of audio without altering its pitch ? #Making |
Curated by SHA2017 | ||
TLS-KDH
This talk is about TLS-KDH. An initiative of ARPA2 that combines the TLS... |
Curated by SHA2017 | ||
Tor & Configuration Management
This presentation will explain in detail how the tor network can grow with a... |
Curated by SHA2017 | ||
Tor, Puppet & Configuration Management Workshop
After a short exploration of puppet and configuration management, a tor relay... |
Curated by SHA2017 | ||
TOYs
I propose to present an interactive scenario with 3D glasses and wireless... |
Curated by SHA2017 | ||
Traveling Light
A workshop about how to choose what to bring, how to pack lightly, and how to... |
Curated by SHA2017 | ||
Update the updates
Much of today's technology is said to be disruptive. In most cases, this... |
Curated by SHA2017 | ||
VJing at SHA-party
visual projection at SHA-parties. makes the dancefloor more colorful and... |
Curated by SHA2017 | ||
Voiceovers
Installation and workshop. introduced for the participants, the basics... |
Curated by SHA2017 | ||
Weaponized Social
We can intentionally build and improve the sociotechnical systems of which we... |
Curated by SHA2017 | ||
We don’t need no security!
Of course we will need security - but maybe not in the way we've 'always'... |
Curated by SHA2017 | ||
What the helmet
This is a fun, hands-on workshop for anyone over 13 (if younger, bring a... |
Curated by SHA2017 | ||
When Tech MIMICS Reality
Many of us are reliant on the digital communication tools and reference... |
Curated by SHA2017 | ||
Wisefire
Chiptune reinterpreted. |
Curated by SHA2017 | ||
WordPress Plugin Boilerplate Powered 2.0
WordPress is the most used CMS in the world and it is very easy to do a... |
Curated by SHA2017 | ||
Working with Vim, Part 1
Wanted to try using Vim, but never got around to it? At this workshop, I'll... |
Curated by SHA2017 | ||
Working with Vim, Part 2
If you know how to use Vim well enough to do some changes here and there, but... |
Curated by SHA2017 | ||
Working with Vim, Part 3
If you're a Vim user, Vimscript is one of the most useful programming... |
Curated by SHA2017 | ||
Workshop firebreathing
Experience firebreathing with experienced instructors from the Dutch... |
Curated by SHA2017 | ||
World'O'Techno
A machine which plays location-based techno, which we'll abandon on the site... |
Curated by SHA2017 | ||
Zanshin Tech: the digital martial art
<p>What do you get when you cross cybersecurity themes with the mindset and... |
Curated by SHA2017 | ||
Zero to chiptune in one hour
An in-depth demonstration of the process of creating video game music on an... |
Curated by SHA2017 |
Curated by Explody
Title | Track | Speakers | |
---|---|---|---|
AIL Framework
AIL is a modular framework to analyse potential information leaks from... |
Curated by Explody | ||
Analyzing Mailinglists with Python
Mailinglists the oldest form of collaboration on the Internet and are central... |
Curated by Explody | ||
Building Businesses that we can Buy Into and Believe In
In the age of corporate surveillance, invasive ad-driven business models and... |
Curated by Explody | ||
Build Usable Tools
You’ve designed and implemented the perfect protocol to keep your target... |
Curated by Explody | ||
Colors at SHA2017: flag colors on the screen, in print and in paint
The SHA logo and design are based on the SHA hashing algorithm and its... |
Curated by Explody | ||
Decentralize! Self-hosting in your own home using Sovereign
Centralized services enable mass surveillance, control and censorship.... |
Curated by Explody | ||
Digital Civil Society
Civil society has been working on digital freedoms and digital rights for... |
Curated by Explody | ||
Digital Security Editathon
The internet is just as much a treasure trove of digital security knowledge... |
Curated by Explody | ||
Ethics in Computing
Developments in the last few years have shown that computing can no longer be... |
Curated by Explody | ||
Get your ass (HTTP infrastructure) on TLS
Helping participants to find the best and most secure tools and... |
Curated by Explody | ||
Hardware games
Making physical games requires a unique knack for creating robust systems. In... |
Curated by Explody | ||
Internet-wide measurements: past, present and future [NEW: we'll scan during SHA live from Day 1]
This workshop will present past, present and possible future scanning... |
Curated by Explody | ||
Introducing Talla: An Erlang implementation of Tor
A technical walk-through of a highly concurrent third-party implementation of... |
Curated by Explody | ||
Keysigning Party
A Keysigning party, quite possibly following the <a... |
Curated by Explody | ||
Let's hack words
Within the framework of the "Hacking Words" writing workshop, interested... |
Curated by Explody | ||
Life Needs Internet
How does internet influence your life? This lecture will be about my ongoing... |
Curated by Explody | ||
Localizing Technology, Together
Through localization of technology, users not only get to contribute to their... |
Curated by Explody | ||
Network concepts introduction & wireshark workshop
<p><b>BRING YOUR LAPTOPS. CHARGE THEM!</b></p> <p>Ever wondered how webpages... |
Curated by Explody | ||
Olmogo - because it's your data!
We present “olmogo”, a novel cryptographic, distributed data storage system... |
Curated by Explody | ||
Q&A with Bill Binney and Kirk Wiebe
|
Curated by Explody |
|
|
The law and leaky abstractions
In this talk I will show positive and negative examples of how laws can... |
Curated by Explody | ||
Tor de-anonymization techniques
Tor offers great anonymity and privacy for millions of people. However, there... |
Curated by Explody |
Curated by the Family Village
Title | Track | Speakers | |
---|---|---|---|
Archery workshop
Archery workshop at the Chriet Titulaer Island. |
Curated by the Family Village |
|
|
Coding with the Micro:bit Workshop 1
This workshop is great for teaching coding fundamentals, and we progress from... |
Curated by the Family Village | ||
Coding with the Micro:bit Workshop 2
This workshop is great for teaching coding fundamentals, and we progress from... |
Curated by the Family Village | ||
Create a better world, teach our kids more hacking skills!
In the past years, it became more and more important to teach our kids more... |
Curated by the Family Village | ||
Cryptokids
Get insight into the technical structure of the Internet, how data works, who... |
Curated by the Family Village | ||
Dissecting owl pellets and crafting clay owls
Uiltopia will give a workshop where children of age 6 and older can dissect... |
Curated by the Family Village |
|
|
Hack in the Class: Arduino
Arduino is an open-source electronics prototyping platform based on flexible,... |
Curated by the Family Village | ||
Hack in the Class: Arduino
Arduino is an open-source electronics prototyping platform based on flexible,... |
Curated by the Family Village | ||
Hack in the Class: How to CTF for kids!
In the world of hacking a lot is not allowed because breaking into computer... |
Curated by the Family Village | ||
Marshmallow challenge
Marshmallow challenge! In teams of 4 you will compete to create the highest... |
Curated by the Family Village |
|
|
Owls and Bird of Pray Flight demonstration
During this demonstration on <b>Alexander Field</b>, Uiltopia will show how... |
Curated by the Family Village |
|
|
Postapocalyptic Goggles-Workshop
We build postapocalyptic goggles and jewellery from leftovers of human... |
Curated by the Family Village | ||
Programmer mind
A game where we program humans as robots with simple instructions (walk 5... |
Curated by the Family Village |
|
|
Raspberry Pi Robot Programming
We show the raspberry pi robot pi2go how it can find his way on his own.... |
Curated by the Family Village | ||
Raspberry Pi Robot Programming
We show the raspberry pi robot pi2go how it can find his way on his own.... |
Curated by the Family Village | ||
Taekwondo for Kids
During SHA on the 5th of August there will be a Taekwondo training for kids... |
Curated by the Family Village |
|
|
Workshop Scratch
Learn to program in scratch. Ages 6 to 8. Bring a laptop! |
Curated by the Family Village |
|
Curated by Hardware Hacking Area
Title | Track | Speakers | |
---|---|---|---|
Arduino For Total Newbies
''Learn Arduino using TV-B-Gone as an example project'' You've probably... |
Curated by Hardware Hacking Area | ||
Arduino For Total Newbies
''Learn Arduino using TV-B-Gone as an example project'' You've probably... |
Curated by Hardware Hacking Area | ||
Coffee Machines & JavaScript
Home automation should make our lives easier, but my Echo can't make me... |
Curated by Hardware Hacking Area | ||
Energy Harvesting for Embedded Systems
Converting ambient energy into electrical energy to power wireless autonomous... |
Curated by Hardware Hacking Area | ||
Hack-N-Swap-O-Rama™
Hack-N-Swap-O-Rama - Beg, haggle, sell, buy, barter and swap! Campers are... |
Curated by Hardware Hacking Area |
|
|
Kubernetes Docker Workshop
Learn how to deploy docker application on a Kubernetes cluster. You've... |
Curated by Hardware Hacking Area | ||
Kubernetes Docker Workshop Bis
Learn how to deploy docker application on a Kubernetes cluster. You've... |
Curated by Hardware Hacking Area | ||
LED Controller with Raspberry Pi
In this workshop we'll discuss various methods for controlling LEDs, and... |
Curated by Hardware Hacking Area | ||
Make aluminium profile connections
Quick workshop where you learn how to make sturdy aluminium profile... |
Curated by Hardware Hacking Area | ||
Surface Mount Electronics Assembly for Terrified Beginners
Surface mount electronics for terrified beginners. Learn to assemble tiny... |
Curated by Hardware Hacking Area |
Curated by the Italian Embassy
Title | Track | Speakers | |
---|---|---|---|
Autopsy of IoT - Nabaztag, the Hare
One of the most dangerous characteristic of IoT is being hidden. So what... |
Curated by the Italian Embassy | ||
Data driven campaign against web tracking
Online websites have trackers for two reasons: they need money, and they are... |
Curated by the Italian Embassy | ||
From NoT to IoT (or the opposite?)
NoT (Network of Things) and IoT (Internet of Things) looks like overlapping... |
Curated by the Italian Embassy | ||
Getting started with DIY level 2 autonomous driving
We will explore the current status of open source efforts to develop... |
Curated by the Italian Embassy | ||
How to develop PyQt software
Qt meets Python and allow you to create a GUI in few minutes. So we will show... |
Curated by the Italian Embassy | ||
Introduction to Mozilla ChangeCopyright
ChangeCopyright è la campagna europea di Mozilla per sensibilizzare gli... |
Curated by the Italian Embassy | ||
Join Mozilla we have cookies
Join Mozilla we have cookies, vieni a scoprire cosa fa Mozilla per te e di... |
Curated by the Italian Embassy | ||
Mobile World
Digital forensics could be very challenging when you need to work with mobile... |
Curated by the Italian Embassy | ||
Modern Digital Forensics analysis, where to find evidence
In the modern interconnected world it’s not simple to find the digital... |
Curated by the Italian Embassy | ||
My own system
Modern Personal Computers are migrating to an Always-on paradigm. We use... |
Curated by the Italian Embassy | ||
New challenges
PCs and Macs are changing. They are inheriting many features from the mobile... |
Curated by the Italian Embassy | ||
Secure communications hardware
This talk will focus on securing end-point-devices from attack by state level... |
Curated by the Italian Embassy | ||
Windows forensics
Windows 10 is, at the same, the old good Windows and a completely new... |
Curated by the Italian Embassy |
Curated by Science for SHA
Title | Track | Speakers | |
---|---|---|---|
dcypher: 28 Bits Later: Entropy-exhausting Attacks Against ASLR Using Side Channels
|
Curated by Science for SHA | ||
dcypher: Post Quantum Crypto
|
Curated by Science for SHA | ||
dcypher: The Economy of the Attacker
|
Curated by Science for SHA | ||
IRMA workshop
I Reveal My Attributes workshop. IRMA is an authentication scheme in which... |
Curated by Science for SHA | ||
Meeting dcypher (The Cyber Security Platform for Higher Education and Research)
dcypher, the dutch cyber security platform for higher education and research,... |
Curated by Science for SHA | ||
Privacy by Design meetup
Interactive workshop by the PI Lab. There is no formal agenda. Goal is to... |
Curated by Science for SHA | ||
SATORI project workshop
SATORI is a platform for the consolidation and advancement of ethical... |
Curated by Science for SHA |
Curated by Free Software Foundation Europe
Title | Track | Speakers | |
---|---|---|---|
F-Droid: Pimp your Android(-fork) with the best Free Software apps
F-Droid is a powerful client that is designed to be resilient against... |
Curated by Free Software Foundation Europe | ||
Free software in the Dutch public sector
There are many shining examples of free software (open source) in the public... |
Curated by Free Software Foundation Europe | ||
Public Money, Public Code
The FSFE's latest campaign "Public money, public code" (PMPC) evolves around... |
Curated by Free Software Foundation Europe | ||
Public Money, Public Code
Software written by the government or it's contractors with public money... |
Curated by Free Software Foundation Europe | ||
What code are you running?
It is code that makes our computers work for us. Do you know what your... |
Curated by Free Software Foundation Europe |
Curated by the LaTeX Village
Title | Track | Speakers | |
---|---|---|---|
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with... |
Curated by the LaTeX Village | ||
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with... |
Curated by the LaTeX Village | ||
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with... |
Curated by the LaTeX Village | ||
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with... |
Curated by the LaTeX Village |
Pancake Warrior Track
Title | Track | Speakers | |
---|---|---|---|
Pancake Workshop
Pancake workshop with free pancakes on a first come first serve basis. |
Pancake Warrior Track | ||
Pancake Workshop
Pancake workshop with free pancakes on a first come first serve basis. |
Pancake Warrior Track | ||
Pancake Workshop
Pancake workshop with free pancakes on a first come first serve basis. |
Pancake Warrior Track | ||
Presentations by villagers
|
Pancake Warrior Track | ||
Presentations by villagers
|
Pancake Warrior Track | ||
Presentations by villagers
|
Pancake Warrior Track |