Still Hacking Anyway (SHA2017)
took place Aug. 4, 2017 through Aug. 8, 2017 (7 years, 11 months ago) in Scoutinglandgoed in Zeewolde, The Netherlands.
Presentations
Friday, Aug. 4, 2017
Saturday, Aug. 5, 2017
-
00:00 - Johannes
-
08:20 - Hack-N-Swap-O-Rama™: One hackers failed project is another's awesome win!
-
09:00 - Working with Vim, Part 1: Learning the Basics
-
09:00 - Gentoo hardened install party: With guidance hard becomes doable.
-
10:00 - Workshop firebreathing
-
10:00 - TLS-KDH: Combining TLS with Kerberos
-
10:00 - LDraw: computer-aided design for serious LEGO fans
-
10:00 - One map to map them all: Why MissingMaps saves lives, and how to help
-
10:00 - 45 minute to Browser Super Powers: Discover how to do extension for the modern browsers
-
10:30 - Digital Security Editathon: A workshop to keep crowdsourced online digital security information relevant
-
10:30 - Postapocalyptic Goggles-Workshop
-
10:40 - Getting started with DIY level 2 autonomous driving
-
11:10 - OpenINTEL: digging in the DNS with an industrial size digger: I measured 60% of the DNS, and I found this
-
11:10 - Moving towards fully encrypted web: Checkpoint on the road towards inevitable
-
11:10 - Localizing Technology, Together: The benefits and how-tos of communally localizing technology, virtually and in physical spaces
-
11:10 - Privacy Design Strategies : Doing well is good enough
-
11:10 - Qubes OS for you and me: SHAttering the security XOR usability paradigm
-
12:00 - WordPress Plugin Boilerplate Powered 2.0: Let's do it a wordpress plugin
-
12:00 - VJing at SHA-party
-
12:20 - Privacy by Design meetup: Interactive session
-
12:20 - The Security and Privacy Implications of AI and Machine Learning
-
12:20 - from glass fiber to fiber glass noodles: towards edible network infrastructures
-
12:20 - Let's stop EU copyright expansion: If you like untaxed links and unsurveilled uploads, you have to join the fight now.
-
12:20 - Digital Civil Society: What have we done, where are we going?
-
12:30 - Introduction to Mozilla ChangeCopyright
-
13:00 - Arduino For Total Newbies: Day 1
-
13:50 - Mailpile: 4 years later
-
13:50 - Analyzing Mailinglists with Python: Look who's talking!
-
14:00 - A Drone is a Drone is a Drone?: by Deafstar
-
15:00 - Introducing Talla: An Erlang implementation of Tor
-
15:00 - Automotive microcontrollers. Safety != Security
-
15:00 - Android Application Pentesting 101: How to Hack Android Applications for Beginners
-
15:00 - Balloon folding workshop: How to amaze you friends and kids with useless skills
-
15:00 - Mass Surveillance abusing Computational Linguistics and Human Language Technology: Mind-sets, state-of-the-art methods and practices according to official documents including leaks
-
15:10 - My own system
-
15:30 - Detecting a breach from an attackers perspective.: We're gonna regret this
-
16:00 - bambi de luxe
-
16:10 - Taekwondo for Kids
-
16:10 - DNA: The Code of Life: Surprise: it is fully digital!
-
16:10 - Practical techniques for whistleblowers to defend themselves in a hostile digital world: practical steps for whistleblowers to defend themselves against investigative witch hunts
-
16:10 - Tor de-anonymization techniques: How people have lost their anonymity? Let's study real-world cases and try to learn how to avoid these errors.
-
16:10 - How to Defend Cars
-
17:20 - Hack North Korea: Flash Drives for Freedom
-
17:20 - Are Whistleblowers safer today than they were at OHM2013?: Current case studies of whistleblowing in Europe, and how the law is progressing
-
17:20 - Beyond the Titanic: Learning from dataleaks
-
17:30 - LED Controller with Raspberry Pi: Control your LED strips using Flask and Websockets
-
17:40 - What code are you running?
-
18:00 - rarenerd
-
18:30 - Social cooling: How the reputation economy is turning us into conformists
-
18:30 - Hacking on a boat: Fun with onboard maritime systems
-
18:30 - Energy Harvesting for Embedded Systems: The future of autonomous wireless electronics without batteries
-
18:30 - TOYs: Interactive performative augmented Reality
-
18:50 - Smart Home Security with Tor: Using TOR for securing Smart Homes from prying eyes
-
19:25 - The Practical Activist: How to build coalitions with people you hate.
-
19:30 - Kubernetes Docker Workshop: Learn how to deploy docker application on a Kubernetes cluster
-
19:40 - An academic's view to incident response: It's all fun and games until reality starts kicking you in the nuts ...
-
19:40 - Network concepts introduction & wireshark workshop: The legendary workshop that teaches you how network really works
-
19:40 - Lecture Decode: Data-sovereignty back to the citizens
-
19:40 - SSH - From Zero to Hero (Workshop): Impress your friends with your freshly acquired SSH knowledge
-
20:00 - ToSeBit Chiptune: A Game Boy is all you need
-
20:00 - Create a better world, teach our kids more hacking skills!
-
20:50 - Improving security with Fuzzing and Sanitizers: Free and open source software has far too many security critical bugs.
-
20:50 - Zero to chiptune in one hour
-
20:50 - Best of IoT Fails: When reality beats science fiction
-
21:00 - Autopsy of IoT - Nabaztag, the Hare
-
22:00 - The Bucket Boyz - Live Band!
-
22:00 - Computational Thinking : How your can teach it.
-
22:00 - Relationship status of technology and legislation: It's complicated
-
22:00 - Open cybertable: Come learn new things, come share your knowledge.
-
22:00 - FILMS: TEETH, Hippis from Hell, Them F*cking Robots
-
22:30 - Modern Digital Forensics analysis, where to find evidence
-
23:00 - Ingo Boss
-
23:10 - Art Tech Activism Privacy and Cool Robots: Not only hackers do Security, Privacy and Hacking. Want to see some hacked Industy Robots playing records, Exoskeletons, Power-of-Google-out-of-control, Grindcore Karaoke-bar, Robots and Activism reaching a broad audience? Meet Real Art!
Sunday, Aug. 6, 2017
-
00:00 - Symphony of Fire: Awesome!
-
00:30 - GoodLife
-
09:00 - Working with Vim, Part 2: Plugins, Tips and Tricks
-
09:45 - Making bombs: How to go off with a (loud) bang
-
10:00 - Coding with the Micro:bit Workshop 1: Learn basic coding with the Micro:bit
-
10:05 - Fermentation Mobile: experimental, educational and commercial fermentation everywhere
-
10:05 - Demolish the web with the Firefox Dev Tools!: Do you know what you can do with Firefox for frontend development?
-
10:05 - SATORI project workshop: Working with ethical impact assessments
-
10:05 - Bypassing Secure Boot using Fault Injection: Bypassing Secure Boot using Fault Injection
-
10:40 - Brief history of IoT (Internet of Things)
-
11:00 - Archery workshop
-
11:15 - Cut by the free and open edge: FLOSS, NGOs, Activists, Journalists, and the Pareto Principle
-
11:15 - Off<>zz Code and Piano Concert: “Code Our Glance” and beta “CodeKlavier”
-
11:15 - How to develop PyQt software
-
11:15 - Exploiting The North American Railways: Modern Day American Hobo-ism
-
11:15 - Make your own titanium spork
-
12:10 - Decentralize! Self-hosting in your own home using Sovereign: act up on decentralization
-
12:10 - Data Exploitation: how your digital doppelganger has been exploiting you all along
-
12:10 - The World in 24 Hours Revisited: How to re-enact a 1982 network art performance
-
12:10 - Zanshin Tech: the digital martial art
-
12:10 - IRMA workshop: Privacy-friendly authentication through attributes
-
13:00 - Hack in the Class: Arduino: Subtitle: Arduino for kids, how to start playing with electronics
-
13:00 - Arduino For Total Newbies: Day 2
-
13:20 - Flip Feng Shui: Advanced Rowhammer exploitation on cloud, desktop, and mobile
-
13:20 - Lightning talks day 3
-
13:20 - Olmogo - because it's your data!: A cryptographically secure social network platform
-
13:20 - Hands up, don't shoot. Unless with a bodycam.
-
14:00 - There is no key signing rave
-
14:30 - A look at TR-06FAIL and other CPE Configuration Management Disasters
-
14:30 - The law and leaky abstractions: In what ways can laws influence the security of society.
-
14:30 - Subtle and Not so Subtle Sexism: Misogyny in Progressive Groups
-
14:30 - My Safe In Your House: Keeping Secrets On Remote Machines
-
15:00 - Hack in the Class: How to CTF for kids!: Subtitle: How to play allowed hacking games
-
15:00 - Secure communications hardware
-
15:40 - Let's hack words: Creative Writing
-
15:40 - Cryptokids: empower kids and provide tools for them to be more secure and to take charge of their own data
-
15:40 - An introduction into next generation computing using Field Programmable Gate Arrays (FPGA): FPGA's are the new hardware
-
15:40 - Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating Systems & Programming Languages: Implementation, hazards and updates on use of RNGs in programming languages and the Linux Kernel (among others)
-
15:40 - Developments in Coordinated Vulnerability Disclosure: The government is here to help
-
16:00 - Raspberry Pi Robot Programming: Let the robot find his way through the Parcour
-
16:50 - GNU Taler: Independent One-Click Payments!
-
16:50 - How I made my diesel motorcycle
-
16:50 - Build Usable Tools
-
16:50 - Human Rights and Internet Infrastructure: standard or substandard?
-
17:00 - Ingo Boss Ambient
-
17:00 - Cyberbullying: reverse engineering: Recognize, manage and stop cyberbullying attacks
-
17:10 - Mobile World
-
17:30 - Coffee Machines & JavaScript: Learn hardware hacking with JavaScript
-
18:00 - Human body as an electric IO system: Hacking your brain, and other body parts. Debunking myths on the way.
-
18:00 - Tor & Configuration Management
-
18:00 - SHOULD I STAY OR SHOULD I GO? : THE ALGORITHMIC PUBLIC SPHERE AND YOU
-
18:00 - Certbot & Let's Encrypt Office Hours
-
18:00 - DNA: More greatest hits: Additional coolness on the greatest digital language ever!
-
18:40 - Kubernetes Docker Workshop Bis: Learn how to deploy docker application on a Kubernetes cluster
-
19:00 - From NoT to IoT (or the opposite?)
-
19:00 - Joghurt Bambaata
-
19:10 - How hackers could have hacked all Dutch elections since 2009
-
19:10 - Hormones and Hysteria - what every person should know: are you not curious now? ;)
-
19:10 - Build your own IoT cloud with MQTT: Using a Raspberry Pi and some ESP8266 devices for your IoT cloud
-
19:10 - We don’t need no security!
-
19:10 - Building Businesses that we can Buy Into and Believe In: What it means to profit from privacy-friendly, open-source technology and mutual respect for our fellow humans
-
19:50 - Internet Poem : internet is as big as your language
-
20:20 - Ethics in Computing
-
20:20 - Social Enterprises as a Tool for Activism
-
20:20 - Digital personal locker: New paradigm in handling personal (health) data
-
20:20 - Hospitals and cyber security
-
21:30 - Rooting the MikroTik routers
-
21:30 - Smart, safe & happy: ensuring civil rights in the digital era
-
21:30 - The state of the pretty Easy privacy (p≡p) project and what to expect next: Easy to use automatic encryption for the masses
-
22:00 - Moldover: Live Electronic Music!: Performing with self-made custom musical instruments
-
22:40 - Malware: From your text editor, to the United States Government's Lab: How Universities in the US collaborate with the United States Government to make America stronger, and the rest weaker.
-
22:40 - Time Stretching BpmDj
-
22:40 - Network Traffic Analysis using Deep Packet Inspection and Data Visualization: Eventpad: the Sublime editor for network traffic
-
22:40 - Hardware games: How to build alternative controllers
-
23:15 - No Place for Fools
-
23:50 - Anonymous, secure and easy. You can have them all.: An authentication protocol that offers security, privacy and ease of use.
Monday, Aug. 7, 2017
-
00:00 - Ambrassband - Live Concert!
-
09:00 - Working with Vim, Part 3: Vim Scripting
-
10:00 - Blockchains for a Better World: From Napster to Bitcoin to Ethereum to Statebox: saving the planet with category theory
-
10:00 - Adventures in Spearphishing: The Good, The Bad, and The Ugly
-
10:00 - Silent Protest: DIY wearable protest network
-
10:00 - Meeting dcypher (The Cyber Security Platform for Higher Education and Research)
-
10:00 - TECHNOSHAMANISM: TECHNOSHAMANISM NETWORKING
-
10:00 - Dissecting owl pellets and crafting clay owls: Make your own owl from clay, or dissect an owl pellet to discover the bones from its last meal.
-
10:30 - dcypher: The Economy of the Attacker
-
10:40 - The Need for Blockchain in International Development: How $1.1 tn dollars slips through the cracks
-
11:10 - Ask your candidates and let everyone know about it: How to make use of democratic elections for your own purpose
-
11:10 - From Project To Kit: Bringing an electronic project to market in kit form
-
11:10 - I have a dream: The ultimate Hackerspace; From Panopticon-prison to Hackervillage-Castle-compound
-
11:10 - Qubes User Group
-
12:00 - SHA2017 Cardbox Boat Regatta: Will it float or sink?
-
12:05 - The quest for algorithm diversity: facebook.tracking.exposed
-
12:05 - On the design of a portable secure filesystem: the crypto bits
-
12:05 - Off Grid: Disclosing your 0days in a videogame mod
-
12:05 - Get your ass (HTTP infrastructure) on TLS: It's about the time.
-
12:15 - Workshop Scratch
-
12:30 - Free software in the Dutch public sector
-
13:00 - Coding with the Micro:bit Workshop 2: Learn coding with the Micro:bit
-
13:00 - dcypher: 28 Bits Later: Entropy-exhausting Attacks Against ASLR Using Side Channels
-
13:00 - Cryptokids: Workshop for kids
-
13:15 - Nerd-Wrangling 101: Managing Neurodiversity with Cognitive Empathy
-
13:15 - Traveling Light: A guide to easy, carry on only packing.
-
13:15 - LoraLight: LoraWan puts the big telco's first, we react
-
13:15 - Playing defence is complicated: What goes into playing defence and what can be holding you down
-
14:00 - The original Internet of Things - Ropes, Knots and Splices: An introduction to knots and splicing
-
14:00 - Jazz brunch with OVB Jazz Allstars: Have your breakfast or lunch in the lounge!
-
14:00 - dcypher: Post Quantum Crypto
-
14:00 - Owls and Bird of Pray Flight demonstration: Learn more about these awesome creatures
-
14:25 - front door nightmare: Smart lock’s electronical vulnerabilities
-
14:25 - Keysigning Party
-
14:25 - MISP threat sharing platform : The MISP threat sharing platform is a free and open source software helping information sharing of threat and cyber security indicators.
-
14:25 - Open networking and hardware/software disaggregation
-
15:00 - Arduino for kids soldering: This workshop is easy enough for total little newbies to learn all you need to know to get going on an Arduino.
-
15:30 - Programmer mind
-
15:35 - Regulating Law Enforcement use of Trojans: Implementing a Law to juridically, operationally and technically regulate the uses of Trojan in Italy
-
15:35 - Lightning talks day 4
-
15:35 - Digital dissent in Latin America: How the Internet is impacting organizing and dissent in Latin America
-
15:35 - Off Grid: How to mod and make your own hacks
-
16:00 - Playable Packaging and Custom Musical Interface Design: Inventing and building new kinds of instruments
-
16:15 - Marshmallow challenge
-
16:45 - Ethics in Technology: Internet Measurements' Ethical Dilemmas and RIPE Atlas
-
16:45 - Responsible Disclosure; How to make your school a safer place.: Story of a 15 year old hacker in collaboration with his school
-
17:00 - Jody Lynne
-
17:10 - Windows forensics
-
17:25 - Cryptography beyond Encryption and Signatures
-
17:30 - Tor, Puppet & Configuration Management Workshop
-
17:55 - Hacking Behavioral Economics: Practical Tools for Do-Gooders
-
17:55 - Gems are truly outrageous: Combining 3D printing and crystallisation techniques
-
17:55 - Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit
-
17:55 - Computer crime and criminal law 101
-
17:55 - Good is hard, but try anyway.: Ethics, colonialism, technological optimism and the reality of relationships with need.
-
18:25 - Having Daft Ideas
-
18:30 - Pancake Workshop
-
19:00 - Open Band: platform for collective sound dialogues
-
19:05 - Neuralscape Bowels: How to read brainwaves using cheap toys
-
19:05 - Weaponized Social: Understanding and tools to mitigate network-scale violences
-
19:05 - In The Eye of the Beholder: Theories of Governance for a Distributed Machine Vision Ecosystem
-
19:05 - Physical Penetration Testing
-
20:00 - Jeff Sivertrust - Live Band!
-
20:15 - Life Needs Internet: Documenting digital culture through handwritten letters
-
20:15 - Off Grid: How to mod and make your own hacks pt.2
-
20:15 - The art of creating an escape room
-
20:15 - Legacy Crypto Never Dies: Cracking DES nearly 20 years after the EFF DES Cracker
-
20:15 - Resisting Algorithms of Mass Destruction: #NotMyDebt Australia
-
20:30 - The Campfire
-
21:00 - The Mad Bitter
-
21:00 - New challenges
-
21:25 - When Tech MIMICS Reality: Identity and Agency In the Age of Algorithms
-
21:25 - Internet-wide measurements: past, present and future [NEW: we'll scan during SHA live from Day 1]: Towards a holistic picture of the Internet's infrastructure and it's activity
-
21:25 - Black Hat Locksmithing: When Locksmiths Go Bad
-
21:25 - The Hackeboy handheld game console: Retro-gaming on open hardware
-
22:00 - Sarah Farina
-
22:15 - What the helmet: Make a boring hard hat into an object of utter coolness
-
22:35 - Let There be Light: Adventures in LED Lighting
-
22:35 - How an intern hacked the powergrid: The Horus Scenario
-
22:35 - Building A Virtual Reality Website using A-Frame
-
22:35 - Run your own VPN provider: workshop how to deploy: Let's Connect VPN
-
22:35 - Car hacking: getting from A to B with Eve
-
23:45 - (In)discrete Music: (mis)adventures in generative art
-
23:45 - Commissioning methods for IoT
-
23:45 - Energy Harvesting for Smart Autonomous Electronics 2: Towards a future of autonomous wireless electronics without batteries
-
23:45 - "Information. What are they looking at?": A documentary on privacy for the broad audience.
Tuesday, Aug. 8, 2017