1000 |
Monitoring Dusty War Zones and Tropical Paradises - Being a Broadcast Anthropologist |
Water Security: Are We in De-Nile or In-Seine? Water Policies, Availability, Geeks Without Bounds and You |
Surveillance Gives Me Chills |
1100 |
Leak Hypocrisy: A Conversation on Whistleblowers, Sources, and the Label "Espionage" |
What is a "Neutral Network" Anyway? An Exploration and Rediscovery of the Aims of Net Neutrality in Theory and Practice |
Orbital Mechanics Ate My Weblog |
1200 |
Women in Cyber Security |
Understanding Tor Onion Services and Their Use Cases |
When Video Is Not Standard Output |
1300 |
KEYNOTE: Cory Doctorow |
(keynote) |
(keynote) |
1400 |
(keynote) |
(keynote) |
(keynote) |
1500 |
FOIA at Fifty |
Medical Devices: Pwnage and Honeypots |
Building Your Own Tor-centric ISP for Fun and (non)Profit |
1600 |
Lockpicking in Real Life versus on the Screen |
The Silk Road to Life without Parole - A Deeper Look at the Trial of Ross Ulbricht |
Bring the Noise: Ten Years of Obfuscation as Counter-Surveillance |
1700 |
Privacy, Anonymity, and Individuality - The Final Battle Begins |
Detour Through Their Minds: How Everyday People Think the Internet Works |
The 0wnerless Library |
1800 |
(continued) |
All Ages: How to Build a Movement |
Computer Science Curricula's Failure - What Can We Do Now? |
1900 |
(continued) |
Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure |
Won't Somebody Please Think of the Journalists? |
2000 |
Stealing Bitcoin with Math |
What the Fuck Are You Talking About? Storytelling for Hackers |
Hacking DNA: Heritage and Health Care |
2100 |
Social Engineering |
Open Source Malware Lab |
2200 |
Now and Then, Here and There |
Code is from Mars, the Courts are from Venus - Reverse Engineering Legal Developments on Reverse Engineering |
Information Overload and the "Last Foot" Problem |
2300 |
TSA Keys Leak: Government Backdoors and the Dangers of Security Theater |
CAPTCHAs - Building and Breaking |
Attacking the Source: Surreptitious Software Features |
2359 |
|