Version Tomorrow is the first day of the rest of your life

Events

Curated by SHA2017

  Title Track Speakers
Img 5918
1)3\/1532
1)3\/1532 (deviser) is drone/noise/experimental soundscaping. The aural...
Curated by SHA2017
Event small
45 minute to Browser Super Powers
Do you know that Firefox now have a new technology that simplify the...
Curated by SHA2017
Event small
Adventures in Spearphishing: The Good, The Bad, and The Ugly
This presentation introduces "phishing spam", an open-source Spearphishing...
Curated by SHA2017
Event small
A look at TR-06FAIL and other CPE Configuration Management Disasters
In late 2016 a TR-064 (LAN-side CPE management) misconfiguration in a wide...
Curated by SHA2017
Event small
Ambrassband - Live Concert!
Curated by SHA2017
Event small
An academic's view to incident response
A timely reaction to security incidents is without doubts important. And...
Curated by SHA2017
Pws
An autopsy in the IoT - Nabaztag, the Hare
The first inhabitant of IoT, the hare Nabaztag will be the protagonist of the...
Curated by SHA2017
Event small
Android Application Pentesting 101
Have you ever wondered what kind of vulnerabilities exist in mobile...
Curated by SHA2017
Altera stratixivgx fpga
An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)
Due to the hunger of many machine learning algorithms computing power of...
Curated by SHA2017
Event small
Anonymous, secure and easy. You can have them all.
All the pieces to make encryption easy, secure and anonymous are in...
Curated by SHA2017
Fabschoolino
Arduino for kids soldering
This workshop is easy enough for total little newbies to learn all you need...
Curated by SHA2017
Can whistleblower be protected forever
Are Whistleblowers safer today than they were at OHM2013?
How does the public view whistleblowers? Would they use social media, blogs...
Curated by SHA2017
000014 flyer
Art Tech Activism Privacy and Cool Robots
Viola van Alphen is activist, writer and former director of multimedia event...
Curated by SHA2017
Event small
Ask your candidates and let everyone know about it
This talk will show and compare different forms of political campaigns during...
Curated by SHA2017
Event small
A trip to India
We will take you behind the scenes of a call center that placed over 5...
Curated by SHA2017
Event small
Attacking OpenSSL using Side-channel Attacks
Side channel attacks (SCA) gained attention in the past years. New low cost...
Curated by SHA2017
Event small
Automotive microcontrollers. Safety != Security
Tesla Model S, Jeep Cherokee, Mitsubishi Outlander, Nissan Leaf… The list of...
Curated by SHA2017
Balloons
Balloon folding workshop
Balloon folding looks complicated, but actually isn't. If you ever wanted to...
Curated by SHA2017
Event small
bambi de luxe
Curated by SHA2017
Event small
Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating Systems & Programming Languages
Over the past year multiple people have been engaging language maintainers...
Curated by SHA2017
Event small
Best of IoT Fails
The internet of things (IoT) is just at the beginning of its development, but...
Curated by SHA2017
Digitalestormvloed
Beyond the Titanic
Slowly ignorance over dataleaks are vanishing. We start to accept that there...
Curated by SHA2017
Event small
Biometric ID cards by the billion
India has rolled out a 'voluntary' biometric ID card to all of its...
Curated by SHA2017
Event small
Black Hat Locksmithing
From thieves to prison breaks to secret tools, the murky world of the...
Curated by SHA2017
Lol
Blockchains for a Better World
The blockchain invention allow us to take our freedom back and save the...
Curated by SHA2017
Photo 31 07 2017  14 57 48
Bluetooth enabled Geocache
A geocache is a modern day trasure hunt. Looking for treasure hidden all over...
Curated by SHA2017
Screenshot 2017 02 24 11.40.52
Brief history of IoT (Internet of Things)
While the IoT buzzword became common in the last four years, in june 2005 a...
Curated by SHA2017
Event small
Building A Virtual Reality Website using A-Frame
A-Frame is an open-source web framework by Mozilla for easily creating VR...
Curated by SHA2017
Event small
Building Humanitarian hackers in your communities - How to
This talk will share lessons from the random hacks of kindness community on...
Curated by SHA2017
Event small
Build your own IoT cloud with MQTT
Using MQTT to connect and use IoT devices
Curated by SHA2017
Event small
Bypassing Secure Boot using Fault Injection
More and more (secure) embedded systems implement a feature to assure the...
Curated by SHA2017
Jolly phi 3rect
Can quantum physics break cryptography's curse?
The history of cryptography is a history of failures. Stronger ciphers...
Curated by SHA2017
Event small
Car hacking: getting from A to B with Eve
Car security is, not surprisingly, a hot topic; after all they are fast and...
Curated by SHA2017
Event small
Certbot & Let's Encrypt Office Hours
You’re trying to turn on https for your site for the first time. You have a...
Curated by SHA2017
Event small
Commissioning methods for IoT
Many of the things we use on a daily basis are becoming smart and connected....
Curated by SHA2017
Pauline maas lezing
Computational Thinking
You will get inspiration how you can teach your kids computational thinking....
Curated by SHA2017
Event small
Computer crime and criminal law 101
Legal lecture on Cybercrime for non-legal-experts #Society #Politics
Curated by SHA2017
Event small
Copyfighters
Copyright is failing young people and their usage of the internet everyday,...
Curated by SHA2017
Event small
Cryptography beyond Encryption and Signatures
This talk will introduce a couple of less well known applications of...
Curated by SHA2017
Event small
Cryptokids
Talk by Henk (waag Society) and Evelyn Austin (Bits of...
Curated by SHA2017
Event small
Cryptowars 2.0: Lessons from the past, for the present
In the 90's there was a political struggle about control of the availability...
Curated by SHA2017
Event small
Cryptowars 2.0: Simulcast
This is the simulcast of Phil Zimmerman's talk taking place in No. #Society
Curated by SHA2017
Event small
Cut by the free and open edge
FLOSS seems to be a natural choice for NGOs and not formalized entities...
Curated by SHA2017
Zt big
Cyberbullying: reverse engineering
<p>The workshop focuses on a real case of cyberbullying: participants will...
Curated by SHA2017
Privacy international large use logo black 1 qgumffx
Data Exploitation
In the world of the "internet of shit" - where it's not just our computers...
Curated by SHA2017
Event small
DDoS attack and defense
In this talk you'll be given a very technical overview of DDoS and mitigation...
Curated by SHA2017
Tc
decentralized casual crypto computing
Practical Tools to Enhance Privacy in Clearnet and to Enable/Disseminate...
Curated by SHA2017
Event small
Demolish the web with the Firefox Dev Tools!
Firefox has amazing dev tools that support the last technologies but they can...
Curated by SHA2017
Event small
Detecting a breach from an attackers perspective.
Detecting a breach is hard, detecting someone who targets your network...
Curated by SHA2017
Event small
Developments in Coordinated Vulnerability Disclosure
There has been much development in recent years on vulnerability disclosure....
Curated by SHA2017
Dd logo
Digital dissent in Latin America
The Internet isn't global. Only half of the world is connected to the...
Curated by SHA2017
Event small
Digital personal locker
Most of our data is held in a fuzzy uncontrollable manner. We propose a...
Curated by SHA2017
Event small
dj-spock
Curated by SHA2017
Event small
DNA: More greatest hits
DNA is a vast subject. In the "DNA: Surprise, it is fully digital"...
Curated by SHA2017
Event small
DNA: The Code of Life
DNA is the code of life. It encodes how we are built, how nature operates....
Curated by SHA2017
Event small
Ed Ruskin
Curated by SHA2017
Solar energy systems ltd logo1
Energy Harvesting for Smart Autonomous Electronics 2
Converting ambient energy into electrical energy to power wireless autonomous...
Curated by SHA2017
Bebrbmncyaarawr
Ethics and the Events of 9-11
Kirk Wiebe will talk about his experiences during his 32 year NSA career,...
Curated by SHA2017
Event small
Ethics in Technology
When designing technologies, networked systems, and measurements on the...
Curated by SHA2017
Event small
Exploiting The North American Railways
From 2005 to 2010 I spent my time hopping freight trains all over the United...
Curated by SHA2017
Tinfoleak logo
Exploiting Twitter with Tinfoleak for investigative purposes
In this talk, I will present a new version of my tool Tinfoleak, the most...
Curated by SHA2017
Fondo3
Exploiting Twitter with Tinfoleak for investigative purposes
In this talk, I will present a new version of my tool Tinfoleak, the most...
Curated by SHA2017
Event small
FaceDancer 2.0
USB connectivity has become ubiquitous. The sheer variety of usb-connected ...
Curated by SHA2017
Event small
Failure modes of digital radios
All consumer electronics have integrated digital radios. Many with...
Curated by SHA2017
Event small
Famous C&C servers from inside to outside.
We all are aware of the malware attacks and bot-net's behind this massive...
Curated by SHA2017
Fhbbuttoncolour large2
Fermentation Mobile
This talk is about setting up mobile fermentation education centers for...
Curated by SHA2017
Tanden
FILMS
Last decades I have made 3 films with technological aspects. Since I am not...
Curated by SHA2017
Event small
Flip Feng Shui
In 2016, the VUSec system security group from Vrije Universiteit Amsterdam...
Curated by SHA2017
Fiberglassnoodle cross section
from glass fiber to fiber glass noodles
Experiments in edible network infrastructures #Experimental
Curated by SHA2017
Event small
From Project To Kit
A talk outlining the process of turning a personal electronic project into a...
Curated by SHA2017
Event small
front door nightmare
bypassing electronic locks without RFID hacking. Smart lock’s electronical...
Curated by SHA2017
Event small
Gems are truly outrageous
This talk demonstrates how to make fake gemstones and related accessories...
Curated by SHA2017
Event small
General Volunteer Angels Introduction
Welcome aboard SHA2017! Attending a self-organised, community-driven event...
Curated by SHA2017
Event small
Gentoo hardened install party
Gentoo Hardened installations are usually seen as hard in both senses. During...
Curated by SHA2017
Webicon1
Get more work area from a CNC machine
This workshop will demonstrate how it is possible to go beyond the initial...
Curated by SHA2017
Event small
GNU Taler
GNU Taler is an online payment system that uses Chaum's blind signatures to...
Curated by SHA2017
Screen shot 2017 07 23 at 6.16.47 pm
Good is hard, but try anyway.
How do we know what good is. Are we creating something worth making? Are we...
Curated by SHA2017
Event small
GoodLife
Curated by SHA2017
Screenshot 1
Hack-a-ble
Although IoT is already embedded in our everyday lives, our security and...
Curated by SHA2017
Event small
Hackerspaces Jedi
We use traceroutes to explore and visualise interconnectedness between...
Curated by SHA2017
Brain
Hacking Behavioral Economics
We will examine through discussion, activities, and break-out groups:...
Curated by SHA2017
0423 043 6
Hacking on a boat
Modern vessels are equipped with all kinds of electronics, to easy...
Curated by SHA2017
Screenshot 2017 01 30 12.38.57
Hack North Korea
HRF North Korea Program team will prepare a presentation to educate SHA 2017...
Curated by SHA2017
Event small
Hands up, don't shoot. Unless with a bodycam.
Dutch police officially started using bodycams eight years ago – although the...
Curated by SHA2017
Event small
Having Daft Ideas
We've made a lot of daft things, some of which have proved to be quite...
Curated by SHA2017
Event small
Heralds Introduction
Angels that would like to be a Herald have to attend one of the...
Curated by SHA2017
Female power event foto christina bakuchava 19
Hormones and Hysteria - what every person should know
I'd like to discuss with your my experience with hormones and perceived...
Curated by SHA2017
Event small
Hospitals and cyber security
The Hospitals are still very attractive for cyber criminals. Not just because...
Curated by SHA2017
Logo url transp 250x250
How an intern hacked the powergrid
This talk focuses on the thesis assignment of Willem Westerhof. During this...
Curated by SHA2017
Event small
How hackers could have hacked all Dutch elections since 2009
In this talk I'll present my findings when researching the security of the...
Curated by SHA2017
Event small
How I made my diesel motorcycle
I have made several diesel powered motorcycles and this is a simple talk or...
Curated by SHA2017
Bebrbmncyaarawr
How the NSA tracks you
Bill Binney will talk about his experiences as Technical Director at the NSA...
Curated by SHA2017
Event small
How the NSA Tracks You: Simulcast
This is the simulcast of the talk by Bill Binney taking place in No.
Curated by SHA2017
Event small
How to Defend Cars
For a long time automobile manufacturers designed their cars as closed...
Curated by SHA2017
Event small
Human body as an electric IO system
A lecture about the brain as electrical Input Output system (the What the...
Curated by SHA2017
Tmp 8065 cms image 000000163 854517912
Human Rights and Internet Infrastructure
Standards bodies, infrastructure providers, internet governance organizations...
Curated by SHA2017
Event small
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text...
Curated by SHA2017
Event small
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text...
Curated by SHA2017
Event small
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text...
Curated by SHA2017
Event small
icibici workshop: a brain-computer interface for your phone/tablet/etc.
Build and use the world's first €25 brain-smartphone interface to enter text...
Curated by SHA2017
Beehive logo
I have a dream
The ultimate Hackerspace; From Panopticon-prison to...
Curated by SHA2017
Event small
Improve IT Projects through Audits
How do you secure small, Internet-based businesses that have few ressources...
Curated by SHA2017
Event small
Improving security with Fuzzing and Sanitizers
A bug in Gstreamer could be used to own a Linux Desktop system. TCPDump...
Curated by SHA2017
Event small
(In)discrete Music
In which we experiment with generative music, based on chaotic systems and...
Curated by SHA2017
Flyer
"Information. What are they looking at?"
Our barrier-free documentary "Information. What are they looking at?" takes...
Curated by SHA2017
Event small
Infrastructure review
Infrastructure talk from Productiehuis, NOC and other interested teams....
Curated by SHA2017
Event small
Ingo Boss
Curated by SHA2017
Screen shot 2017 03 22 at 7.02.31 pm
Internet Poem
Reading performance of the poem, 'internet is as big as your language' aka....
Curated by SHA2017
Event small
In The Eye of the Beholder
Capitalist underpinnings of advanced technology development threatens...
Curated by SHA2017
Game boy.norepeat
Intro to Game Boy hacking
In this workshop will present you with tools and resources to get started...
Curated by SHA2017
Event small
Invitation to help build Quantum Internet
The goal of Quantum Internet project at TU Delft is to build an...
Curated by SHA2017
Event small
Joghurt Bambaata
Curated by SHA2017
Event small
Johannes
Curated by SHA2017
Ldraw logo
LDraw: computer-aided design for serious LEGO fans
LDraw™ is an open standard for LEGO CAD programs that allow the user to...
Curated by SHA2017
Logo 4x 3
Lecture Decode: Data-sovereignty back to the citizens
Join this talk on DECODE, a project that provides tools that put individuals...
Curated by SHA2017
Event small
Legacy Crypto Never Dies
In 2012 I released a DES cracking service with Moxie Marlinspike for cracking...
Curated by SHA2017
Illegalthings2
Let's stop EU copyright expansion
European Commission plans are underway to introduce an extra copyright for...
Curated by SHA2017
Event small
Let There be Light
The talk aims to be an introduction to LED lighting, how to create lighting...
Curated by SHA2017
Event small
Life is too short for playing classic sports...
In this presentation, I'll try to convince the audience how the CTF...
Curated by SHA2017
Event small
Lightning talks day 3
Curated by SHA2017
Event small
Lightning talks day 4
Curated by SHA2017
Event small
Lightning talks day 5
Curated by SHA2017
Event small
Lockpicking and IT Security
What do design flaws, implementation errors, 0days etc. look like in physical...
Curated by SHA2017
Event small
LoraLight
LoraWan, the communication protocol on top of Lora is being developed and...
Curated by SHA2017
Apple touch icon 114x114
Mailpile
Four years ago, in a tent at OHM 2013, the Mailpile project and crowd-funding...
Curated by SHA2017
Event small
Make your own titanium spork
Attendees will make their own titanium spork, to their own design, cutting it...
Curated by SHA2017
Event small
Making bombs
We'll make small quantities of hydrogen gas and let them explode.
Curated by SHA2017
220px national security agency headquarters  fort meade  maryland
Malware: From your text editor, to the United States Government's Lab
Ever wonder where your malware ends up after you deploy it? Are you curious...
Curated by SHA2017
Onyx zimmerwald 5
Mass Surveillance abusing Computational Linguistics and Human Language Technology
Even though the Snowden revelations for the first time clearly show that mass...
Curated by SHA2017
Event small
Mathematics and Video Games
In this talk, I will talk about some interesting applications of maths to...
Curated by SHA2017
Misp logo
MISP threat sharing platform
Information sharing is a key element in detecting security breaches and...
Curated by SHA2017
P wojnarski   moldover   house of controllers copy
Moldover: Live Electronic Music!
History notes only a handful of artists who successfully pushed the limits -...
Curated by SHA2017
Event small
Moving towards fully encrypted web
In this talk I'm going to go through the problems people are facing in moving...
Curated by SHA2017
Event small
My Safe In Your House
All those shiny cloud services sound tempting, but unfortunately they might...
Curated by SHA2017
Event small
Nerd-Wrangling 101
Neurodiversity is the concept that neurological conditions are variations in...
Curated by SHA2017
Spyspot teaser
Network Traffic Analysis using Deep Packet Inspection and Data Visualization
For the protection of (critical) infrastructures against complex virus...
Curated by SHA2017
Event small
Neuralscape Bowels
The idea of how to transform brainwaves in images and sounds is not new, but...
Curated by SHA2017
Poster web
No Place for Fools
Sergey Astahov is a gay man converted by Church and state propaganda into an...
Curated by SHA2017
Nothing to hide poster light
Nothing to Hide
Screening of the documentary film Nothing to Hide (86minutes, with the...
Curated by SHA2017
Yd7uxno
NSFW: Di[CENSORED]s for privacy
History, relevance and future of penis imagery in culture. A radical way...
Curated by SHA2017
Tmp 7126 offgrid logo black459591497
Off Grid: Disclosing your 0days in a videogame mod
Off Grid is a different kind of hacking game, and it is fully moddable. The...
Curated by SHA2017
Tmp 22529 offgrid logo black582778176
Off Grid: How to mod and make your own hacks
Following on from the talk 'Disclosing your 0day's in a videogame mod' this...
Curated by SHA2017
Offgrid logo black
Off Grid: How to mod and make your own hacks pt.2
Following on from the talk 'Disclosing your 0day's in a videogame mod' and...
Curated by SHA2017
Event small
Off<>zz Code and Piano Concert
For SHA2017, Off<>zz will present a two part music concert of piano and live...
Curated by SHA2017
Missingmaps logo
One map to map them all
The MissingMaps project started almost three years ago. Since then, all over...
Curated by SHA2017
Event small
On the design of a portable secure filesystem: the crypto bits
In this presentation I will present the cryptographic aspects of a...
Curated by SHA2017
Screen shot 2017 01 30 at 4.44.44 pm
Open Band
Open Band, is a project that aims to experience the empowerment of public in...
Curated by SHA2017
Event small
Open cybertable
Do you have an interest in computer or network security but you need help...
Curated by SHA2017
Event small
OpenINTEL: digging in the DNS with an industrial size digger
Since early 2015, the University of Twente, SURFnet and SIDN collaborate in...
Curated by SHA2017
Event small
Open networking and hardware/software disaggregation
Open Networking or "Web scale networking" is the concept where you're no...
Curated by SHA2017
Shaparkours
Parkour communications
Using encryption and onion routing is all fine and dandy, but both can be...
Curated by SHA2017
Event small
Physical Penetration Testing
Your pentesting goal: getting the data. You decide to do it physically. How...
Curated by SHA2017
Jen head crop to square
Playable Packaging and Custom Musical Interface Design
In this presentation, Moldover will discuss the motivation behind his bespoke...
Curated by SHA2017
Event small
Playing defence is complicated
What kind of work goes into implementing secure services? Service providers...
Curated by SHA2017
Protectingbeauty
Practical techniques for whistleblowers to defend themselves in a hostile digital world
The return of data retention laws in places like Australia (2 year retention...
Curated by SHA2017
Event small
Privacy Design Strategies
Privacy laws are complex and vague. They offer little concrete guidelines for...
Curated by SHA2017
Speaker 312596 960 720
Public speaking for technical people
As a technical person, you work with complicated and often important matters....
Curated by SHA2017
Qubes logo icon
Qubes OS for you and me
Qubes OS challenges the notion that security and usability are mutually...
Curated by SHA2017
Qubes
Qubes User Group
Qubes is a reasonably-secure desktop operating system based on using the Xen...
Curated by SHA2017
Event small
Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit
CVE-2017-2636 is a 7-year old race condition in the Linux kernel that was...
Curated by SHA2017
Event small
Rapakivi&Henson
Curated by SHA2017
Event small
rarenerd
Curated by SHA2017
Event small
Regulating Law Enforcement use of Trojans
The complexity of implementing a policy (law) and related operational and...
Curated by SHA2017
Event small
Relationship status of technology and legislation: It's complicated
Legislation is said to be slow to follow technological developments. This not...
Curated by SHA2017
Event small
Resisting Algorithms of Mass Destruction
When the Australian media use the word “clusterfuck” in headlines describing...
Curated by SHA2017
Img 0593
Responsible Disclosure; How to make your school a safer place.
This talk is about the collaboration and Responsible Disclosure in a school...
Curated by SHA2017
Mikrotik
Rooting the MikroTik routers
In this talk I describe my journey into reverse engineering parts of MikroTik...
Curated by SHA2017
Event small
Run your own VPN provider
Easy to install and secure VPN service that respects your privacy Public...
Curated by SHA2017
Event small
Ruud van der Klugt
Curated by SHA2017
Seccubus logo
Seccubus workshop
Seccubus is an open source tool I have written to make my life scanning...
Curated by SHA2017
Selection 111
SHA2017 Badge
The SHA2017 Badge overview. #Making
Curated by SHA2017
Bc5c702f14264262a37acb3976cb8e83
SHA2017 Cardbox Boat Regatta
We will have a cardboxboat race in the harbour, can u make a cardboxboat and...
Curated by SHA2017
Event small
SHA2017 Closing
A summary extraordinaire. #Community
Curated by SHA2017
Event small
SHA2017 Closing Simulcast
Simulcast of the Closing Ceremonies #Community
Curated by SHA2017
Event small
SHA2017 Opening
Welcome to SHA2017! So much camp, everywhere! #Community
Curated by SHA2017
Event small
SHA2017 Opening Simulcast
This is the overflow simulcast of the SHA2017 Opening Ceremonies #Community
Curated by SHA2017
Event small
SHOULD I STAY OR SHOULD I GO?
Today’s tech companies have enormous power over what we can access and share,...
Curated by SHA2017
Silentprotest
Silent Protest
Independent observers are noting a decrease in Freedom of speech worldwide....
Curated by SHA2017
Event small
Smart Home Security with Tor
The IoT is emerging as the third wave in the development of the Internet. We...
Curated by SHA2017
Ancilla n
Smart, safe & happy
Privacy-minded charities have a hard time going up against silicon valley's...
Curated by SHA2017
Event small
Social Enterprises as a Tool for Activism
We have entered the era of President Trump. Activists, NGOs, and charities...
Curated by SHA2017
Event small
Software Patents v3.0: the Unitary Patent Court
In July 2005, after several failed attempts to legalise software patents in...
Curated by SHA2017
Event small
SSH - From Zero to Hero (Workshop)
So you have used SSH from the command line? Even used scp to transfer files....
Curated by SHA2017
Event small
Subtle and Not so Subtle Sexism
An open meeting to discuss sexism, large and small.
Curated by SHA2017
Event small
Symphony of Fire
Location: near No and Pa. Symphony of Fire is the partnership between Uwe...
Curated by SHA2017
Event small
TBM: Trusted boot module
The Trusted Boot Module is an open hardware module that enables all kind of...
Curated by SHA2017
1545947 10153303257164470 671080263593781027 n
TECHNOSHAMANISM
Presentation of the Technoshamanism network. Concepts, practices, festivals,...
Curated by SHA2017
Event small
The art of creating an escape room
At the moment of submitting this talk there are 500+ escape rooms in The...
Curated by SHA2017
Event small
The Bucket Boyz - Live Band!
Live Concert!
Curated by SHA2017
Campfire pinecone
The Campfire
The offical SHA2017 campfire
Curated by SHA2017
Campfire pinecone
The Campfire
The offical SHA2017 campfire
Curated by SHA2017
Campfire pinecone
The Campfire
The official sha2017 campfire
Curated by SHA2017
Campfire pinecone
The Campfire
The offical sha2017 campfire
Curated by SHA2017
Fenrir head
The Fenrir Project
TLS can be limiting, OAuth is a (somewhat working) mess. What would happen...
Curated by SHA2017
Hackeboy logo preview 1
The Hackeboy handheld game console
Hackefuffel is a small indie game label of 8-bit-heads from Hamburg. In late...
Curated by SHA2017
Event small
The Need for Blockchain in International Development
After working for two boot-strapping, innovation fueled startups solving...
Curated by SHA2017
Event small
The One Ring, goldsmithing workshop
Mobile goldsmithing workshop, We (you!) will make a nice faceted silver ring...
Curated by SHA2017
Event small
The original Internet of Things - Ropes, Knots and Splices
Ropes and fibres are part of our daily life but the real quality of a good...
Curated by SHA2017
Event small
The Practical Activist
Not for the faint of heart! This workshop is training to work with very...
Curated by SHA2017
Event small
The quest for algorithm diversity
Our vision is to increase transparency behind personalization algorithms. <a...
Curated by SHA2017
Robot
The Security and Privacy Implications of AI and Machine Learning
What will the recent rapid progress in machine learning and AI mean for the...
Curated by SHA2017
Event small
The Soul Travelers - Live Band!
Curated by SHA2017
Pep logo
The state of the pretty Easy privacy (p≡p) project and what to expect next
The pretty Easy privacy (p≡p) project has the primary goal to make encryption...
Curated by SHA2017
Interplay copy
The World in 24 Hours Revisited
In this talk we look at The World in 24 Hours, an early computer network art...
Curated by SHA2017
Ctxs1.5
Time Stretching BpmDj
How to modify the speed of audio without altering its pitch ? #Making
Curated by SHA2017
Logo tls kdh
TLS-KDH
This talk is about TLS-KDH. An initiative of ARPA2 that combines the TLS...
Curated by SHA2017
Event small
Tor & Configuration Management
This presentation will explain in detail how the tor network can grow with a...
Curated by SHA2017
Event small
Tor, Puppet & Configuration Management Workshop
After a short exploration of puppet and configuration management, a tor relay...
Curated by SHA2017
Event small
TOYs
I propose to present an interactive scenario with 3D glasses and wireless...
Curated by SHA2017
Img 6468
Traveling Light
A workshop about how to choose what to bring, how to pack lightly, and how to...
Curated by SHA2017
Event small
Update the updates
Much of today's technology is said to be disruptive. In most cases, this...
Curated by SHA2017
Event small
VJing at SHA-party
visual projection at SHA-parties. makes the dancefloor more colorful and...
Curated by SHA2017
Event small
Voiceovers
Installation and workshop. introduced for the participants, the basics...
Curated by SHA2017
1200px scalingethics
Weaponized Social
We can intentionally build and improve the sociotechnical systems of which we...
Curated by SHA2017
Event small
We don’t need no security!
Of course we will need security - but maybe not in the way we've 'always'...
Curated by SHA2017
Whatthehelmetintro
What the helmet
This is a fun, hands-on workshop for anyone over 13 (if younger, bring a...
Curated by SHA2017
Event small
When Tech MIMICS Reality
Many of us are reliant on the digital communication tools and reference...
Curated by SHA2017
Event small
Wisefire
Chiptune reinterpreted.
Curated by SHA2017
Event small
WordPress Plugin Boilerplate Powered 2.0
WordPress is the most used CMS in the world and it is very easy to do a...
Curated by SHA2017
Vimlogo.svg
Working with Vim, Part 1
Wanted to try using Vim, but never got around to it? At this workshop, I'll...
Curated by SHA2017
Vimlogo.svg
Working with Vim, Part 2
If you know how to use Vim well enough to do some changes here and there, but...
Curated by SHA2017
Vimlogo.svg
Working with Vim, Part 3
If you're a Vim user, Vimscript is one of the most useful programming...
Curated by SHA2017
644344 446447135441244 1360999790 n
Workshop firebreathing
Experience firebreathing with experienced instructors from the Dutch...
Curated by SHA2017
1 p8060381 001
World'O'Techno
A machine which plays location-based techno, which we'll abandon on the site...
Curated by SHA2017
Zt big
Zanshin Tech: the digital martial art
<p>What do you get when you cross cybersecurity themes with the mindset and...
Curated by SHA2017
Tracker3
Zero to chiptune in one hour
An in-depth demonstration of the process of creating video game music on an...
Curated by SHA2017

Curated by Explody

  Title Track Speakers
Logo small
AIL Framework
AIL is a modular framework to analyse potential information leaks from...
Curated by Explody
Event small
Analyzing Mailinglists with Python
Mailinglists the oldest form of collaboration on the Internet and are central...
Curated by Explody
Event small
Building Businesses that we can Buy Into and Believe In
In the age of corporate surveillance, invasive ad-driven business models and...
Curated by Explody
Event small
Build Usable Tools
You’ve designed and implemented the perfect protocol to keep your target...
Curated by Explody
Event small
Colors at SHA2017: flag colors on the screen, in print and in paint
The SHA logo and design are based on the SHA hashing algorithm and its...
Curated by Explody
Event small
Decentralize! Self-hosting in your own home using Sovereign
Centralized services enable mass surveillance, control and censorship....
Curated by Explody
Tmp 8324 cms image 000000163 1057824983
Digital Civil Society
Civil society has been working on digital freedoms and digital rights for...
Curated by Explody
Cryptoparty
Digital Security Editathon
The internet is just as much a treasure trove of digital security knowledge...
Curated by Explody
Event small
Ethics in Computing
Developments in the last few years have shown that computing can no longer be...
Curated by Explody
Event small
Get your ass (HTTP infrastructure) on TLS
Helping participants to find the best and most secure tools and...
Curated by Explody
Event small
Hardware games
Making physical games requires a unique knack for creating robust systems. In...
Curated by Explody
Event small
Internet-wide measurements: past, present and future [NEW: we'll scan during SHA live from Day 1]
This workshop will present past, present and possible future scanning...
Curated by Explody
Talla logo blue
Introducing Talla: An Erlang implementation of Tor
A technical walk-through of a highly concurrent third-party implementation of...
Curated by Explody
Event small
Keysigning Party
A Keysigning party, quite possibly following the <a...
Curated by Explody
Event small
Let's hack words
Within the framework of the "Hacking Words" writing workshop, interested...
Curated by Explody
Test
Life Needs Internet
How does internet influence your life? This lecture will be about my ongoing...
Curated by Explody
Localizationlab 2
Localizing Technology, Together
Through localization of technology, users not only get to contribute to their...
Curated by Explody
Net
Network concepts introduction & wireshark workshop
<p><b>BRING YOUR LAPTOPS. CHARGE THEM!</b></p> <p>Ever wondered how webpages...
Curated by Explody
Event small
Olmogo - because it's your data!
We present “olmogo”, a novel cryptographic, distributed data storage system...
Curated by Explody
Event small
Q&A with Bill Binney and Kirk Wiebe
Curated by Explody
Event small
The law and leaky abstractions
In this talk I will show positive and negative examples of how laws can...
Curated by Explody
Event small
Tor de-anonymization techniques
Tor offers great anonymity and privacy for millions of people. However, there...
Curated by Explody

Curated by the Family Village

  Title Track Speakers
Event small
Archery workshop
Archery workshop at the Chriet Titulaer Island.
Curated by the Family Village
2017 06 15 10.35.35
Coding with the Micro:bit Workshop 1
This workshop is great for teaching coding fundamentals, and we progress from...
Curated by the Family Village
2017 06 05 11.54.54
Coding with the Micro:bit Workshop 2
This workshop is great for teaching coding fundamentals, and we progress from...
Curated by the Family Village
Event small
Create a better world, teach our kids more hacking skills!
In the past years, it became more and more important to teach our kids more...
Curated by the Family Village
Event small
Cryptokids
Get insight into the technical structure of the Internet, how data works, who...
Curated by the Family Village
Event small
Dissecting owl pellets and crafting clay owls
Uiltopia will give a workshop where children of age 6 and older can dissect...
Curated by the Family Village
Event small
Hack in the Class: Arduino
Arduino is an open-source electronics prototyping platform based on flexible,...
Curated by the Family Village
Event small
Hack in the Class: Arduino
Arduino is an open-source electronics prototyping platform based on flexible,...
Curated by the Family Village
Event small
Hack in the Class: How to CTF for kids!
In the world of hacking a lot is not allowed because breaking into computer...
Curated by the Family Village
Event small
Marshmallow challenge
Marshmallow challenge! In teams of 4 you will compete to create the highest...
Curated by the Family Village
Event small
Owls and Bird of Pray Flight demonstration
During this demonstration on <b>Alexander Field</b>, Uiltopia will show how...
Curated by the Family Village
Schrott logo
Postapocalyptic Goggles-Workshop
We build postapocalyptic goggles and jewellery from leftovers of human...
Curated by the Family Village
Event small
Programmer mind
A game where we program humans as robots with simple instructions (walk 5...
Curated by the Family Village
Logo pexlabs rot
Raspberry Pi Robot Programming
We show the raspberry pi robot pi2go how it can find his way on his own....
Curated by the Family Village
Logo pexlabs rot
Raspberry Pi Robot Programming
We show the raspberry pi robot pi2go how it can find his way on his own....
Curated by the Family Village
Event small
Taekwondo for Kids
During SHA on the 5th of August there will be a Taekwondo training for kids...
Curated by the Family Village
Event small
Workshop Scratch
Learn to program in scratch. Ages 6 to 8. Bring a laptop!
Curated by the Family Village

Curated by Hardware Hacking Area

  Title Track Speakers
A4tn33c3 500pix
Arduino For Total Newbies
''Learn Arduino using TV-B-Gone as an example project'' You've probably...
Curated by Hardware Hacking Area
A4tn33c3 500pix
Arduino For Total Newbies
''Learn Arduino using TV-B-Gone as an example project'' You've probably...
Curated by Hardware Hacking Area
Event small
Coffee Machines & JavaScript
Home automation should make our lives easier, but my Echo can't make me...
Curated by Hardware Hacking Area
Event small
Energy Harvesting for Embedded Systems
Converting ambient energy into electrical energy to power wireless autonomous...
Curated by Hardware Hacking Area
Event small
Hack-N-Swap-O-Rama™
Hack-N-Swap-O-Rama - Beg, haggle, sell, buy, barter and swap! Campers are...
Curated by Hardware Hacking Area
Kubernetes2
Kubernetes Docker Workshop
Learn how to deploy docker application on a Kubernetes cluster. You've...
Curated by Hardware Hacking Area
Kubernetes2
Kubernetes Docker Workshop Bis
Learn how to deploy docker application on a Kubernetes cluster. You've...
Curated by Hardware Hacking Area
Event small
LED Controller with Raspberry Pi
In this workshop we'll discuss various methods for controlling LEDs, and...
Curated by Hardware Hacking Area
Event small
Make aluminium profile connections
Quick workshop where you learn how to make sturdy aluminium profile...
Curated by Hardware Hacking Area
Event small
Surface Mount Electronics Assembly for Terrified Beginners
Surface mount electronics for terrified beginners. Learn to assemble tiny...
Curated by Hardware Hacking Area

Curated by the Italian Embassy

  Title Track Speakers
Screenshot 2017 02 24 11.40.52
Autopsy of IoT - Nabaztag, the Hare
One of the most dangerous characteristic of IoT is being hidden. So what...
Curated by the Italian Embassy
Event small
Data driven campaign against web tracking
Online websites have trackers for two reasons: they need money, and they are...
Curated by the Italian Embassy
Pws
From NoT to IoT (or the opposite?)
NoT (Network of Things) and IoT (Internet of Things) looks like overlapping...
Curated by the Italian Embassy
Event small
Getting started with DIY level 2 autonomous driving
We will explore the current status of open source efforts to develop...
Curated by the Italian Embassy
Event small
How to develop PyQt software
Qt meets Python and allow you to create a GUI in few minutes. So we will show...
Curated by the Italian Embassy
Event small
Introduction to Mozilla ChangeCopyright
ChangeCopyright è la campagna europea di Mozilla per sensibilizzare gli...
Curated by the Italian Embassy
Event small
Join Mozilla we have cookies
Join Mozilla we have cookies, vieni a scoprire cosa fa Mozilla per te e di...
Curated by the Italian Embassy
Event small
Mobile World
Digital forensics could be very challenging when you need to work with mobile...
Curated by the Italian Embassy
Event small
Modern Digital Forensics analysis, where to find evidence
In the modern interconnected world it’s not simple to find the digital...
Curated by the Italian Embassy
Event small
My own system
Modern Personal Computers are migrating to an Always-on paradigm. We use...
Curated by the Italian Embassy
Event small
New challenges
PCs and Macs are changing. They are inheriting many features from the mobile...
Curated by the Italian Embassy
Event small
Secure communications hardware
This talk will focus on securing end-point-devices from attack by state level...
Curated by the Italian Embassy
Event small
Windows forensics
Windows 10 is, at the same, the old good Windows and a completely new...
Curated by the Italian Embassy

Curated by Science for SHA

  Title Track Speakers
Event small
dcypher: 28 Bits Later: Entropy-exhausting Attacks Against ASLR Using Side Channels
Curated by Science for SHA
Event small
dcypher: Post Quantum Crypto
Curated by Science for SHA
Event small
dcypher: The Economy of the Attacker
Curated by Science for SHA
Event small
IRMA workshop
I Reveal My Attributes workshop. IRMA is an authentication scheme in which...
Curated by Science for SHA
Event small
Meeting dcypher (The Cyber Security Platform for Higher Education and Research)
dcypher, the dutch cyber security platform for higher education and research,...
Curated by Science for SHA
Event small
Privacy by Design meetup
Interactive workshop by the PI Lab. There is no formal agenda. Goal is to...
Curated by Science for SHA
Event small
SATORI project workshop
SATORI is a platform for the consolidation and advancement of ethical...
Curated by Science for SHA

Curated by Free Software Foundation Europe

  Title Track Speakers
Fdroid
F-Droid: Pimp your Android(-fork) with the best Free Software apps
F-Droid is a powerful client that is designed to be resilient against...
Curated by Free Software Foundation Europe
Event small
Free software in the Dutch public sector
There are many shining examples of free software (open source) in the public...
Curated by Free Software Foundation Europe
Event small
Public Money, Public Code
The FSFE's latest campaign "Public money, public code" (PMPC) evolves around...
Curated by Free Software Foundation Europe
Event small
Public Money, Public Code
Software written by the government or it's contractors with public money...
Curated by Free Software Foundation Europe
Event small
What code are you running?
It is code that makes our computers work for us. Do you know what your...
Curated by Free Software Foundation Europe

Curated by the LaTeX Village

  Title Track Speakers
Event small
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with...
Curated by the LaTeX Village
Event small
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with...
Curated by the LaTeX Village
Event small
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with...
Curated by the LaTeX Village
Event small
LaTeX
This talk is about what LaTeX is, how you can use it and what you can do with...
Curated by the LaTeX Village

Pancake Warrior Track

  Title Track Speakers
Event small
Pancake Workshop
Pancake workshop with free pancakes on a first come first serve basis.
Pancake Warrior Track
Event small
Pancake Workshop
Pancake workshop with free pancakes on a first come first serve basis.
Pancake Warrior Track
Event small
Pancake Workshop
Pancake workshop with free pancakes on a first come first serve basis.
Pancake Warrior Track
Event small
Presentations by villagers
Pancake Warrior Track
Event small
Presentations by villagers
Pancake Warrior Track
Event small
Presentations by villagers
Pancake Warrior Track