(on 6th floor unless otherwise designated)
3D Modeling with Fusion 360
Nora Benson, Austin Chen
Come one, come all and learn to model with Autodesk’s newest 3D design tool: Fusion 360, a cloud-enabled 3D CAD (Computer Aided Design), CAM (Computer Aided Machining), and CAE (Computer Aided Engineering) tool that makes product design faster and easier than ever before. Fusion 360 is an innovative program that combines the ability to parametric and free form model, run simulations, and edit and review with a group over the cloud. Plus it’s great for beginner modelers and experienced product designers alike! Come with your ideas, a ready-to-learn mind, and the free trial version of Fusion 360 downloaded on your laptop and we’ll take it from there!
Saturday 1530-1730 Budapest
Amateur Radio License Exam
You can take the Amateur Radio exam at The Eleventh HOPE! All levels of tests are offered.
Sunday 1300-1500 Paris
aestetix, Brian Hofer
This is a workshop, as well as an extended Q&A associated with the "Spy Hard with a Vengeance" talk.
Sunday 1630-1730 Budapest
Arduino for Total Newbies
You’ve probably heard lots about Arduino. But if you don’t know what it is, or how you can use it to do all sorts of cool things, then this fun and easy workshop is for you. As an example project, you’ll be creating a TV-B-Gone remote control out of an Arduino you can take home with you. (Materials fee: $35.)Optional: bring your laptop if you’d like it set up for playing with Arduino.
Saturday 1530-1900 Hardware Hacking Area (Mezzanine)
Comet Crowbar, Ben Cooper
Following Comet Crowbar’s talk “How to Start A Crypto Party,” you can join her for this beginner’s introduction on how to resist surveillance by embracing tools for encryption and how to be anonymous online. She will cover strong passwords, GPG encryption, and explain what a “keypair” is, along with Signal, Tor, and other common tools. This will be half a presentation, half hands-on doing stuff on your computer/devices (bring them if you have them!).
Friday 1930-2130 Paris
Cyber Deception: Hunting Advanced Attacks with MazeRunner
During this workshop, attendees will learn about MazeRunner, Cymmetria’s free cyber deception general use tool being released for the first time. They will be able to set up deception across environments that will be composed of decoys - real virtual machines that can be Linux/Windows systems, configure these machines with different network protocols and content to make them look like anything to deceive a hacker, and lastly create the connections and credentials to these configurations to deploy to the endpoints, thereby creating a complete layer of deception to lead an attacker. Next, you will be shown how to use the alerts and forensics gathered in order to enable automatic mitigation of threats and enrich your threat intel efforts.Optional: bring your laptop with KVM (Linux) OR VMWare (Windows).
Sunday 1000-1200 Paris
DIYSECT: film screening of Biotinkering for the Web
DIYSECT is a documentary web series on biohacking and bioart, focusing on the social, political, and philosophical aspects of biotechnology. Initiated in 2013,DIYSECT has released five episodes and gathered interviews from over sixty biohackers, bioartists, synthetic biologists, writers, and curators. At The Eleventh HOPE, there will be a screening of all five episodes back-to-back: 1) Learning in Public, 2) Bioterror and Bioerror, 3) Fear of the Unknown, 4) Genocracy, and 5) Hybrid Practices.
Friday 1400-1600 Paris
Unexpected input often causes programs to crash. Learn how to develop remote code execution exploits from such crashes. In this workshop, participants will take over a series of real servers using these techniques: shell command injection, ImageMagick expoloitation, SQL injection, and buffer overflows with shellcode. Participants need to bring a computer running OS X or Linux in either a real or a virtual machine. A few loaner laptops will be available.
Sunday 1600-1900 Paris
Michael Morisy, Michael Ravnitzky, Janon Fisher
FOIA 101 will show you how to request a variety of federal agency records using the Freedom of Information Act, the Privacy Act, and Mandatory Declassification Review; and also how to get state and local agency records under similar state laws. The format of a request letter will be illustrated, and there will be a discussion on how to find the right agency and address to send a letter, how to frame the letter to avoid fee problems, what phrases help prompt agencies to disclose the most information, and other requester tools. You will learn how the process of getting electronic records differs from that of getting paper records, and you will hear case studies detailing how public records have been used by journalists, activists, and the general public to better inform our democracy. Becoming familiar with these essential steps streamlines the process and make it simpler for both requesters and the offices from which they are requesting records. This workshop will feature an opportunity to ask questions of the panelists.
Saturday 1900-2000 Paris
FOIA 201: Advanced FOIA Strategies and Tactics
Michael Morisy, Michael Ravnitzky, Janon Fisher
This workshop will review some of the common methods agencies use to deter or deny requests, and how to react constructively so you can get the records you want. Among the aspects that will be discussed are how to fight off improper fees, how to ask for database records, how to negotiate successfully with agency staff, when to narrow a request, and how to best respond when agencies say “you can’t have that.” You will also learn how to figure out what to ask for and formulate a request so that it is most likely to produce a useful response in a useful data format. Examples will be drawn from the GovernmentAttic.org and MuckRock websites as well as the experience of the panelists. This workshop will feature an opportunity for give and take discussion based on the interest of attendees, and the opportunity to ask questions of the panelists and other participants.
Saturday 2000-2130 Paris
Getting Started with Encrypted Communications
Sequoia McDowell, Matt Mitchell, Martin Shelton
Want to encrypt your email/chat but not sure how to get started? In this beginner-oriented workshop, you’ll get hands-on help in getting set up with encrypted email and chat on your laptop, text, talk, and email on your smart phone. Come at the beginning for a short (15 minute) presentation on security basics andbring your laptop or smart phone for hands-on help! (If you just want to get set up and go, drop-ins are also welcome!)
Friday 1000-1200 Paris
Holistic Info-Sec for Web Developers
Join Kim Carter for an exploration into an insightful set of steps he has learned, from an architectural, engineering, and penetration testing perspective. Based on the content of Volume 0 and 1 of Kim’s new bookHolistic Info-Sec for Web Developers. Kim will walk through how your Scrum Team can bring the specialized process of penetration testing from the release phase to right up front, augmenting your Scrum process within each and every Sprint using a collection of processes, practices, and tools that have proven their value in the field of information security. Kim will walk us through the SSM threat modeling process with examples in areas such as physical, people, VPS, network, cloud, web applications, etc.
Saturday 1000-1200 Paris
How to Fight an Internet Shutdown
Internet shutdowns pose a terrifying and real threat worldwide. They have become early warning mechanisms for human rights violations during the most critical moment of democracies: elections. In 2015 alone, Access Now recorded nearly 20 shutdowns in a variety of contexts and situations, from the Pacific Ocean to Pakistan to the Democratic Republic of the Congo. Even the U.S. has a mysterious “killswitch” rule on the books called Standard Operating Procedure 303 that could allow the government to shut down the net. Shutdowns harm innovation, stymie local economies (banks alone lost an estimated $22.6 million during an April shutdown in Kashmir, India), and block the use of emergency services. Come join this workshop as a real Internet shutdown is simulated through interactive role play. What can you do? What should companies do? What about telcos and governments? Find out how you can make a difference.
Friday 1000-1200 Budapest
Intro to Ham Radio: What You Need to Know Now to Start Tomorrow
Whether you’re interested in DIY electronics, digital communications, or technology in general, you’ll find something to interest you in amateur radio. This workshop will cover some basics of the amateur radio service (how to get a license, different types of equipment, operating modes, etc.), highlight some of the most interesting developments, and also offer exam preparation resources and discussion for the amateur radio exam sessions being held on Sunday. Stop by to find out how to get involved in amateur radio, and also leave with enough materials to cram for the exam Sunday so you can get on the air!Materials/equipment: None required, except for your choice of device for accessing documents online or via a USB drive.
Friday 1200-1300 Paris
Open Source Estrogen
Open Source Estrogen combines do-it-yourself science, body and gender politics, and ecological ramifications of the present. It is a form of biotechnical civil disobedience that demonstrates the complex, entrenched ways in which estrogen is a biomolecule with institutional biopower. The workshop will show participants various low-cost, DIY extraction and detection methods for environmental estrogen, thereby exploring the social, ethical, and environmental implications of estrogen de-regulation. A 45-minute talk will be given at the beginning, followed by the workshop.
Friday 1600-1900 Paris
Pop-Up Plant Lab
Sebastian S. Cocioba, Sung won Lim
A hands-on plant tissue culture pop-up lab catering to the curious but inexperienced, with a focus on teaching the technical and physical manipulations necessary to do plant tissue culture. Students will be instructed on how to dissect and plate leaf tissue of freshly sown tobacco leaves growing in sterile conditions onto media with plant growth regulators which will induce somaticembryogenesis or “babies from the body.” All plant cells can be reprogrammed using chemical queues such that near-infinite clones of the original plant can be produced. This technology is used in industrial-scale production of ornamental plants but requires minimal overhead if approached creatively. Using over the counter vessels and easily made lab equipment, you too can clone your own army of plants and you’ll learn how here!
various times in Biohacking Area (Mezzanine) -- please check poster there
The Next Billion Certificates: Let’s Encrypt and Scaling the Web PKI
Let’s Encrypt is a free and automated certificate authority. If you’re developing a client to integrate with Let’s Encrypt or trying to deploy Let’s Encrypt certificates at scale, come to this workshop to discuss best practices and work through any issues.Optional: bring your laptop.
Saturday 1200-1300 Paris
Even if you have never programmed before, you can quickly and easily learn how to make custom hacking tools in Python. In hands-on projects, participants will create tools and hack into test systems, including: port scanning, login brute-forcing, port knocking, cracking password hashes, ARP spoofing, layer 7 DoS attacks, and sneaking malicious code past antivirus products. Participants need to bring a computer running OS X or Linux in either a real or a virtual machine. A few loaner laptops will be available.
Saturday 1300-1600 Paris