Still Hacking Anyway (SHA2017)
took place Aug. 4, 2017 through Aug. 8, 2017 (8 years, 1 month ago) in Scoutinglandgoed in Zeewolde, The Netherlands.
Presentations
Friday, Aug. 4, 2017
Saturday, Aug. 5, 2017
-
00:00 - Johannes
-
08:20 - Hack-N-Swap-O-Rama™: One hackers failed project is another's awesome win!
-
09:00 - Working with Vim, Part 1: Learning the Basics
-
09:00 - Gentoo hardened install party: With guidance hard becomes doable.
-
10:00 - Workshop firebreathing
-
10:00 - TLS-KDH: Combining TLS with Kerberos
-
10:00 - LDraw: computer-aided design for serious LEGO fans
-
10:00 - One map to map them all: Why MissingMaps saves lives, and how to help
-
10:00 - 45 minute to Browser Super Powers: Discover how to do extension for the modern browsers
-
10:30 - Digital Security Editathon: A workshop to keep crowdsourced online digital security information relevant
-
10:30 - Postapocalyptic Goggles-Workshop
-
10:40 - Getting started with DIY level 2 autonomous driving
-
11:10 - OpenINTEL: digging in the DNS with an industrial size digger: I measured 60% of the DNS, and I found this
-
11:10 - Moving towards fully encrypted web: Checkpoint on the road towards inevitable
-
11:10 - Localizing Technology, Together: The benefits and how-tos of communally localizing technology, virtually and in physical spaces
-
11:10 - Privacy Design Strategies : Doing well is good enough
-
11:10 - Qubes OS for you and me: SHAttering the security XOR usability paradigm
-
12:00 - WordPress Plugin Boilerplate Powered 2.0: Let's do it a wordpress plugin
-
12:00 - VJing at SHA-party
-
12:20 - Privacy by Design meetup: Interactive session
-
12:20 - The Security and Privacy Implications of AI and Machine Learning
-
12:20 - from glass fiber to fiber glass noodles: towards edible network infrastructures
-
12:20 - Let's stop EU copyright expansion: If you like untaxed links and unsurveilled uploads, you have to join the fight now.
-
12:20 - Digital Civil Society: What have we done, where are we going?
-
12:30 - Introduction to Mozilla ChangeCopyright
-
13:00 - Arduino For Total Newbies: Day 1
-
13:50 - Mailpile: 4 years later
-
13:50 - Analyzing Mailinglists with Python: Look who's talking!
-
14:00 - A Drone is a Drone is a Drone?: by Deafstar
-
15:00 - Introducing Talla: An Erlang implementation of Tor
-
15:00 - Automotive microcontrollers. Safety != Security
-
15:00 - Android Application Pentesting 101: How to Hack Android Applications for Beginners
-
15:00 - Balloon folding workshop: How to amaze you friends and kids with useless skills
-
15:00 - Mass Surveillance abusing Computational Linguistics and Human Language Technology: Mind-sets, state-of-the-art methods and practices according to official documents including leaks
-
15:10 - My own system
-
15:30 - Detecting a breach from an attackers perspective.: We're gonna regret this
-
16:00 - bambi de luxe
-
16:10 - Taekwondo for Kids
-
16:10 - DNA: The Code of Life: Surprise: it is fully digital!
-
16:10 - Practical techniques for whistleblowers to defend themselves in a hostile digital world: practical steps for whistleblowers to defend themselves against investigative witch hunts
-
16:10 - Tor de-anonymization techniques: How people have lost their anonymity? Let's study real-world cases and try to learn how to avoid these errors.
-
16:10 - How to Defend Cars
-
17:20 - Hack North Korea: Flash Drives for Freedom
-
17:20 - Are Whistleblowers safer today than they were at OHM2013?: Current case studies of whistleblowing in Europe, and how the law is progressing
-
17:20 - Beyond the Titanic: Learning from dataleaks
-
17:30 - LED Controller with Raspberry Pi: Control your LED strips using Flask and Websockets
-
17:40 - What code are you running?
-
18:00 - rarenerd
-
18:30 - Social cooling: How the reputation economy is turning us into conformists
-
18:30 - Hacking on a boat: Fun with onboard maritime systems
-
18:30 - Energy Harvesting for Embedded Systems: The future of autonomous wireless electronics without batteries
-
18:30 - TOYs: Interactive performative augmented Reality
-
18:50 - Smart Home Security with Tor: Using TOR for securing Smart Homes from prying eyes
-
19:25 - The Practical Activist: How to build coalitions with people you hate.
-
19:30 - Kubernetes Docker Workshop: Learn how to deploy docker application on a Kubernetes cluster
-
19:40 - An academic's view to incident response: It's all fun and games until reality starts kicking you in the nuts ...
-
19:40 - Network concepts introduction & wireshark workshop: The legendary workshop that teaches you how network really works
-
19:40 - Lecture Decode: Data-sovereignty back to the citizens
-
19:40 - SSH - From Zero to Hero (Workshop): Impress your friends with your freshly acquired SSH knowledge
-
20:00 - ToSeBit Chiptune: A Game Boy is all you need
-
20:00 - Create a better world, teach our kids more hacking skills!
-
20:50 - Improving security with Fuzzing and Sanitizers: Free and open source software has far too many security critical bugs.
-
20:50 - Zero to chiptune in one hour
-
20:50 - Best of IoT Fails: When reality beats science fiction
-
21:00 - Autopsy of IoT - Nabaztag, the Hare
-
22:00 - The Bucket Boyz - Live Band!
-
22:00 - Computational Thinking : How your can teach it.
-
22:00 - Relationship status of technology and legislation: It's complicated
-
22:00 - Open cybertable: Come learn new things, come share your knowledge.
-
22:00 - FILMS: TEETH, Hippis from Hell, Them F*cking Robots
-
22:30 - Modern Digital Forensics analysis, where to find evidence
-
23:00 - Ingo Boss
-
23:10 - Art Tech Activism Privacy and Cool Robots: Not only hackers do Security, Privacy and Hacking. Want to see some hacked Industy Robots playing records, Exoskeletons, Power-of-Google-out-of-control, Grindcore Karaoke-bar, Robots and Activism reaching a broad audience? Meet Real Art!
Sunday, Aug. 6, 2017
-
00:00 - Symphony of Fire: Awesome!
-
00:30 - GoodLife
-
09:00 - Working with Vim, Part 2: Plugins, Tips and Tricks
-
09:45 - Making bombs: How to go off with a (loud) bang
-
10:00 - Coding with the Micro:bit Workshop 1: Learn basic coding with the Micro:bit
-
10:05 - Fermentation Mobile: experimental, educational and commercial fermentation everywhere
-
10:05 - Demolish the web with the Firefox Dev Tools!: Do you know what you can do with Firefox for frontend development?
-
10:05 - SATORI project workshop: Working with ethical impact assessments
-
10:05 - Bypassing Secure Boot using Fault Injection: Bypassing Secure Boot using Fault Injection
-
10:40 - Brief history of IoT (Internet of Things)
-
11:00 - Archery workshop
-
11:15 - Cut by the free and open edge: FLOSS, NGOs, Activists, Journalists, and the Pareto Principle
-
11:15 - Off<>zz Code and Piano Concert: “Code Our Glance” and beta “CodeKlavier”
-
11:15 - How to develop PyQt software
-
11:15 - Exploiting The North American Railways: Modern Day American Hobo-ism
-
11:15 - Make your own titanium spork
-
12:10 - Decentralize! Self-hosting in your own home using Sovereign: act up on decentralization
-
12:10 - Data Exploitation: how your digital doppelganger has been exploiting you all along
-
12:10 - The World in 24 Hours Revisited: How to re-enact a 1982 network art performance
-
12:10 - Zanshin Tech: the digital martial art
-
12:10 - IRMA workshop: Privacy-friendly authentication through attributes
-
13:00 - Hack in the Class: Arduino: Subtitle: Arduino for kids, how to start playing with electronics
-
13:00 - Arduino For Total Newbies: Day 2
-
13:20 - Flip Feng Shui: Advanced Rowhammer exploitation on cloud, desktop, and mobile
-
13:20 - Lightning talks day 3
-
13:20 - Olmogo - because it's your data!: A cryptographically secure social network platform
-
13:20 - Hands up, don't shoot. Unless with a bodycam.
-
14:00 - There is no key signing rave
-
14:30 - A look at TR-06FAIL and other CPE Configuration Management Disasters
-
14:30 - The law and leaky abstractions: In what ways can laws influence the security of society.
-
14:30 - Subtle and Not so Subtle Sexism: Misogyny in Progressive Groups
-
14:30 - My Safe In Your House: Keeping Secrets On Remote Machines
-
15:00 - Hack in the Class: How to CTF for kids!: Subtitle: How to play allowed hacking games
-
15:00 - Secure communications hardware
-
15:40 - Let's hack words: Creative Writing
-
15:40 - Cryptokids: empower kids and provide tools for them to be more secure and to take charge of their own data
-
15:40 - An introduction into next generation computing using Field Programmable Gate Arrays (FPGA): FPGA's are the new hardware
-
15:40 - Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating Systems & Programming Languages: Implementation, hazards and updates on use of RNGs in programming languages and the Linux Kernel (among others)
-
15:40 - Developments in Coordinated Vulnerability Disclosure: The government is here to help
-
16:00 - Raspberry Pi Robot Programming: Let the robot find his way through the Parcour
-
16:50 - GNU Taler: Independent One-Click Payments!
-
16:50 - How I made my diesel motorcycle
-
16:50 - Build Usable Tools
-
16:50 - Human Rights and Internet Infrastructure: standard or substandard?
-
17:00 - Ingo Boss Ambient
-
17:00 - Cyberbullying: reverse engineering: Recognize, manage and stop cyberbullying attacks
-
17:10 - Mobile World
-
17:30 - Coffee Machines & JavaScript: Learn hardware hacking with JavaScript
-
18:00 - Human body as an electric IO system: Hacking your brain, and other body parts. Debunking myths on the way.
-
18:00 - Tor & Configuration Management
-
18:00 - SHOULD I STAY OR SHOULD I GO? : THE ALGORITHMIC PUBLIC SPHERE AND YOU
-
18:00 - Certbot & Let's Encrypt Office Hours
-
18:00 - DNA: More greatest hits: Additional coolness on the greatest digital language ever!
-
18:40 - Kubernetes Docker Workshop Bis: Learn how to deploy docker application on a Kubernetes cluster
-
19:00 - From NoT to IoT (or the opposite?)
-
19:00 - Joghurt Bambaata
-
19:10 - How hackers could have hacked all Dutch elections since 2009
-
19:10 - Hormones and Hysteria - what every person should know: are you not curious now? ;)
-
19:10 - Build your own IoT cloud with MQTT: Using a Raspberry Pi and some ESP8266 devices for your IoT cloud
-
19:10 - We don’t need no security!
-
19:10 - Building Businesses that we can Buy Into and Believe In: What it means to profit from privacy-friendly, open-source technology and mutual respect for our fellow humans
-
19:50 - Internet Poem : internet is as big as your language
-
20:20 - Ethics in Computing
-
20:20 - Social Enterprises as a Tool for Activism
-
20:20 - Digital personal locker: New paradigm in handling personal (health) data
-
20:20 - Hospitals and cyber security
-
21:30 - Rooting the MikroTik routers
-
21:30 - Smart, safe & happy: ensuring civil rights in the digital era
-
21:30 - The state of the pretty Easy privacy (p≡p) project and what to expect next: Easy to use automatic encryption for the masses
-
22:00 - Moldover: Live Electronic Music!: Performing with self-made custom musical instruments
-
22:40 - Malware: From your text editor, to the United States Government's Lab: How Universities in the US collaborate with the United States Government to make America stronger, and the rest weaker.
-
22:40 - Time Stretching BpmDj
-
22:40 - Network Traffic Analysis using Deep Packet Inspection and Data Visualization: Eventpad: the Sublime editor for network traffic
-
22:40 - Hardware games: How to build alternative controllers
-
23:15 - No Place for Fools
-
23:50 - Anonymous, secure and easy. You can have them all.: An authentication protocol that offers security, privacy and ease of use.
Monday, Aug. 7, 2017
-
00:00 - Ambrassband - Live Concert!
-
09:00 - Working with Vim, Part 3: Vim Scripting
-
10:00 - Blockchains for a Better World: From Napster to Bitcoin to Ethereum to Statebox: saving the planet with category theory
-
10:00 - Adventures in Spearphishing: The Good, The Bad, and The Ugly
-
10:00 - Silent Protest: DIY wearable protest network
-
10:00 - Meeting dcypher (The Cyber Security Platform for Higher Education and Research)
-
10:00 - TECHNOSHAMANISM: TECHNOSHAMANISM NETWORKING
-
10:00 - Dissecting owl pellets and crafting clay owls: Make your own owl from clay, or dissect an owl pellet to discover the bones from its last meal.
-
10:30 - dcypher: The Economy of the Attacker
-
10:40 - The Need for Blockchain in International Development: How $1.1 tn dollars slips through the cracks
-
11:10 - Ask your candidates and let everyone know about it: How to make use of democratic elections for your own purpose
-
11:10 - From Project To Kit: Bringing an electronic project to market in kit form
-
11:10 - I have a dream: The ultimate Hackerspace; From Panopticon-prison to Hackervillage-Castle-compound
-
11:10 - Qubes User Group
-
12:00 - SHA2017 Cardbox Boat Regatta: Will it float or sink?
-
12:05 - The quest for algorithm diversity: facebook.tracking.exposed
-
12:05 - On the design of a portable secure filesystem: the crypto bits
-
12:05 - Off Grid: Disclosing your 0days in a videogame mod
-
12:05 - Get your ass (HTTP infrastructure) on TLS: It's about the time.
-
12:15 - Workshop Scratch
-
12:30 - Free software in the Dutch public sector
-
13:00 - Coding with the Micro:bit Workshop 2: Learn coding with the Micro:bit
-
13:00 - dcypher: 28 Bits Later: Entropy-exhausting Attacks Against ASLR Using Side Channels
-
13:00 - Cryptokids: Workshop for kids
-
13:15 - Nerd-Wrangling 101: Managing Neurodiversity with Cognitive Empathy
-
13:15 - Traveling Light: A guide to easy, carry on only packing.
-
13:15 - LoraLight: LoraWan puts the big telco's first, we react
-
13:15 - Playing defence is complicated: What goes into playing defence and what can be holding you down
-
14:00 - The original Internet of Things - Ropes, Knots and Splices: An introduction to knots and splicing
-
14:00 - Jazz brunch with OVB Jazz Allstars: Have your breakfast or lunch in the lounge!
-
14:00 - dcypher: Post Quantum Crypto
-
14:00 - Owls and Bird of Pray Flight demonstration: Learn more about these awesome creatures
-
14:25 - front door nightmare: Smart lock’s electronical vulnerabilities
-
14:25 - Keysigning Party
-
14:25 - MISP threat sharing platform : The MISP threat sharing platform is a free and open source software helping information sharing of threat and cyber security indicators.
-
14:25 - Open networking and hardware/software disaggregation
-
15:00 - Arduino for kids soldering: This workshop is easy enough for total little newbies to learn all you need to know to get going on an Arduino.
-
15:30 - Programmer mind
-
15:35 - Regulating Law Enforcement use of Trojans: Implementing a Law to juridically, operationally and technically regulate the uses of Trojan in Italy
-
15:35 - Lightning talks day 4
-
15:35 - Digital dissent in Latin America: How the Internet is impacting organizing and dissent in Latin America
-
15:35 - Off Grid: How to mod and make your own hacks
-
16:00 - Playable Packaging and Custom Musical Interface Design: Inventing and building new kinds of instruments
-
16:15 - Marshmallow challenge
-
16:45 - Ethics in Technology: Internet Measurements' Ethical Dilemmas and RIPE Atlas
-
16:45 - Responsible Disclosure; How to make your school a safer place.: Story of a 15 year old hacker in collaboration with his school
-
17:00 - Jody Lynne
-
17:10 - Windows forensics
-
17:25 - Cryptography beyond Encryption and Signatures
-
17:30 - Tor, Puppet & Configuration Management Workshop
-
17:55 - Hacking Behavioral Economics: Practical Tools for Do-Gooders
-
17:55 - Gems are truly outrageous: Combining 3D printing and crystallisation techniques
-
17:55 - Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit
-
17:55 - Computer crime and criminal law 101
-
17:55 - Good is hard, but try anyway.: Ethics, colonialism, technological optimism and the reality of relationships with need.
-
18:25 - Having Daft Ideas
-
18:30 - Pancake Workshop
-
19:00 - Open Band: platform for collective sound dialogues
-
19:05 - Neuralscape Bowels: How to read brainwaves using cheap toys
-
19:05 - Weaponized Social: Understanding and tools to mitigate network-scale violences
-
19:05 - In The Eye of the Beholder: Theories of Governance for a Distributed Machine Vision Ecosystem
-
19:05 - Physical Penetration Testing
-
20:00 - Jeff Sivertrust - Live Band!
-
20:15 - Life Needs Internet: Documenting digital culture through handwritten letters
-
20:15 - Off Grid: How to mod and make your own hacks pt.2
-
20:15 - The art of creating an escape room
-
20:15 - Legacy Crypto Never Dies: Cracking DES nearly 20 years after the EFF DES Cracker
-
20:15 - Resisting Algorithms of Mass Destruction: #NotMyDebt Australia
-
20:30 - The Campfire
-
21:00 - The Mad Bitter
-
21:00 - New challenges
-
21:25 - When Tech MIMICS Reality: Identity and Agency In the Age of Algorithms
-
21:25 - Internet-wide measurements: past, present and future [NEW: we'll scan during SHA live from Day 1]: Towards a holistic picture of the Internet's infrastructure and it's activity
-
21:25 - Black Hat Locksmithing: When Locksmiths Go Bad
-
21:25 - The Hackeboy handheld game console: Retro-gaming on open hardware
-
22:00 - Sarah Farina
-
22:15 - What the helmet: Make a boring hard hat into an object of utter coolness
-
22:35 - Let There be Light: Adventures in LED Lighting
-
22:35 - How an intern hacked the powergrid: The Horus Scenario
-
22:35 - Building A Virtual Reality Website using A-Frame
-
22:35 - Run your own VPN provider: workshop how to deploy: Let's Connect VPN
-
22:35 - Car hacking: getting from A to B with Eve
-
23:45 - (In)discrete Music: (mis)adventures in generative art
-
23:45 - Commissioning methods for IoT
-
23:45 - Energy Harvesting for Smart Autonomous Electronics 2: Towards a future of autonomous wireless electronics without batteries
-
23:45 - "Information. What are they looking at?": A documentary on privacy for the broad audience.
Tuesday, Aug. 8, 2017