• 0
  • 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability

    Matt Flick, Jeff Yestrumskas
    Fri, 12:00 - 12:50
    Track 3 - Track 3
  • 3
  • 30k Feet Look at WiFi

    Goldy
    Sun, 14:00 - 14:50
    Turbo/Breakout Track - Turbo/Breakout
  • A
  • AAPL- Automated Analog Telephone Logging

    Steve Clement, Leigh Honeywell
    Sun, 13:30 - 13:50
    Turbo/Breakout Track - Turbo/Breakout
  • Abusing Firefox Addons

    Sam Bowne, TK234
    Sat, 14:00 - 14:50
    Track 4 - Track 4
  • Advanced MySQL Exploitation

    Charlie Vedaa
    Fri, 14:30 - 14:50
    Turbo/Breakout Track - Turbo/Breakout
  • Advanced SQL Injection

    Tobias Bluzmanis
    Sun, 10:00 - 10:50
    Turbo/Breakout Track - Turbo/Breakout
  • Advancing Video Application Attacks with Video Interception, Recording, and Replay

    Rich Mogull
    Fri, 14:00 - 14:50
    Track 3 - Track 3
  • Air Traffic Control: Insecurity and ADS-B

    Adam Savage
    Sat, 11:00 - 11:50
    Turbo/Breakout Track - Turbo/Breakout
  • A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera

    Steve Dunker, Efrain Torres
    Sat, 11:00 - 11:50
    Track 1 - Track 1
  • An Open JTAG Debugger

    Chris Gates
    Sat, 16:30 - 17:20
    Turbo/Breakout Track - Turbo/Breakout
  • App Assessment the Metasploit Way

    Jay Beale
    Sat, 17:30 - 18:00
    Track 2 - Track 2
  • Ask EFF: The Year in Digital Civil Liberties

    Peter Eckersley, Marcia Hofmann, Jibran Ilyas, Grant Jordan, Josh Marks, Nicholas J. Percoco
    Fri, 16:00 - 17:50
    Track 4 - Track 4
  • Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less

    Douglas C. Merrill
    Fri, 11:00 - 11:20
    Track 2 - Track 2
  • Attacking SMS. It's No Longer Your BFF

    Muhaimin Dzulfakar
    Fri, 14:00 - 14:20
    Turbo/Breakout Track - Turbo/Breakout
  • Attacking Tor at the Application Layer

    Jerry Dixon
    Fri, 18:00 - 18:50
    Track 3 - Track 3
  • Attacks Against 2wire Residential Gateways

    Nicolle Neulist
    Sun, 12:30 - 12:50
    Turbo/Breakout Track - Turbo/Breakout
  • Automated Malware Similarity Analysis

    Logan Lodge
    Fri, 17:00 - 17:20
    Turbo/Breakout Track - Turbo/Breakout
  • B
  • Beckstrom's Law - A Model for Valuing Networks and Security

    Efstratios L. Gavas
    Fri, 10:00 - 10:50
    Track 4 - Track 4
  • Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly

    Larry Aiello
    Fri, 11:00 - 11:50
    Turbo/Breakout Track - Turbo/Breakout
  • BitTorrent Hacks

    Bruce Potter, Mike Zusman
    Fri, 17:00 - 17:50
    Track 3 - Track 3
  • Bluetooth, Smells Like Chicken

    FX, David Maynor, Edward Zaborowski
    Sat, 17:00 - 17:50
    Track 1 - Track 1
  • Breaking the "Unbreakable" Oracle with Metasploit

    K.C. Budd, Nathan Hamiel
    Sat, 10:00 - 10:50
    Track 2 - Track 2
  • C
  • Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Traffic

    Jennifer Granick
    Fri, 10:00 - 10:50
    Turbo/Breakout Track - Turbo/Breakout
  • Clobbering the Cloud

    Marcus Sachs, Phyllis Schneck, Ed Skoudis
    Sat, 17:00 - 17:50
    Track 4 - Track 4
  • Closing Ceremonies hosted by The Dark Tangent

     
    Sun, 17:00 - 17:50
    Contest Area
  • Cloud Security in Map/Reduce

    Digividual
    Fri, 12:30 - 12:50
    Turbo/Breakout Track - Turbo/Breakout
  • Computer and Internet Security Law - A Year in Review 2008 - 2009

    Danny Quist
    Fri, 15:00 - 15:50
    Track 3 - Track 3
  • Confidence Game Theater

    Peter Gutmann
    Sun, 15:00 - 15:50
    Track 2 - Track 2
  • Con Kung-Fu: Defending Yourself @ DEF CON

    Matt Krick
    Thu, 16:00 - 16:20
    Track 1 - Track 1
  • Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…

    Daniel
    Sun, 16:00 - 16:50
    Track 3 - Track 3
  • Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security

    Nick Farr
    Sun, 13:00 - 13:20
    Turbo/Breakout Track - Turbo/Breakout
  • Criminal Charges are not pursued: Hacking PKI

    Paul F. Renda
    Fri, 17:30 - 18:20
    Track 1 - Track 1
  • Cross Site Scripting Anonymous Browser 2.0

    Psifertex, Jason Schlesinger
    Fri, 12:00 - 12:20
    Turbo/Breakout Track - Turbo/Breakout
  • CSRF: Yeah, It Still Works

    Sean Boyce, David Rook
    Sat, 11:00 - 11:50
    Track 4 - Track 4
  • D
  • Dangerous Minds: The Art of Guerrilla Data Mining

    Sandy Clark
    Sun, 15:00 - 15:50
    Track 3 - Track 3
  • DCFluX in: The Man with the Soldering Gun

    Dead Addict
    Thu, 16:00 - 17:00
    Track 2 - Track 2
  • DC Network Session

    Jim Rennie
    Thu, 16:00 - 19:00
    Capri Rooms 103/104
  • Death of Anonymous Travel

    Moxie Marlinspike
    Fri, 12:00 - 13:50
    Track 4 - Track 4
  • Deblaze - A Remote Method Enumeration Tool for Flex Servers

    Jason Ostrom
    Fri, 13:30 - 13:50
    Turbo/Breakout Track - Turbo/Breakout
  • DEF CON 101

    Corentin Chéron, HighWiz, Lee Kushner, Miss Jackalope, Jeff Moss, Noid, Deviant Ollam, Russr, Siviak, Thorn
    Thu, 13:00 - 16:00
    Track 1 - Track 1
  • DEF CON 1 - A Personal Account

    Lockheed
    Thu, 16:00 - 17:00
    Track 3 - Track 3
  • Defcon Security Jam 2: The Fails Keep on Coming

    Brandon Dixon, Robert Hansen, Michael Ligh, David Maynor, Larry Pesce, Matthew Richard
    Fri, 14:00 - 15:50
    Track 4 - Track 4
  • De Gustibus, or Hacking your Tastebuds

    Roy Ragsdale
    Sun, 16:00 - 16:50
    Turbo/Breakout Track - Turbo/Breakout
  • Design and Implementation of a Quantum True Random Number Generator

    Joe Grand
    Sat, 12:30 - 12:50
    Turbo/Breakout Track - Turbo/Breakout
  • Doppelganger: The Web's Evil Twin

    Dino Dai Zovi
    Sat, 17:30 - 17:50
    Turbo/Breakout Track - Turbo/Breakout
  • Down the Rabbit Hole: Uncovering a Criminal Server

    Matt Fiddler
    Sun, 10:00 - 10:50
    Track 4 - Track 4
  • Dradis Framework - Sharing Information will get you Root

     
    Sun, 12:00 - 12:50
    Track 3 - Track 3
  • E
  • Effective Information Security Career Planning

    Dr. Fouad Kiamilev, Mike Murray
    Thu, 13:00 - 16:00
    Track 2 - Track 2
  • eXercise in Messaging and Presence Pwnage

    Cody Pollet
    Sun, 11:00 - 11:50
    Track 1 - Track 1
  • F
  • Failure

    Zoz
    Sat, 13:00 - 13:50
    Track 1 - Track 1
  • FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers)

    Nick Waite
    Sat, 14:00 - 14:50
    Track 3 - Track 3
  • Fragging Game Servers

    Jim Christy, Gregory Fleischer
    Fri, 17:30 - 18:20
    Track 2 - Track 2
  • G
  • Good Vibrations: Hacking Motion Sickness on the Cheap

    Chema Alonso
    Sun, 12:00 - 12:50
    Track 2 - Track 2
  • H
  • Hackerspaces: The Legal Bases

    Cough
    Sun, 14:00 - 14:50
    Track 1 - Track 1
  • Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival

    Corentin Chéron, Antoine Gademer
    Sat, 10:00 - 11:50
    Track 3 - Track 3
  • Hacking, Biohacking, and the Future of Humanity

    Mario Ceballos
    Sun, 10:00 - 10:50
    Track 2 - Track 2
  • Hacking Sleep: How to Build Your Very Own Sleep Lab

    Jon R. Kibler, George Louthan
    Sun, 11:00 - 11:50
    Track 2 - Track 2
  • Hacking the Apple TV and Where your Forensic Data Lives

    Rob DeGulielmo, Randy Robbins
    Thu, 15:00 - 17:00
    Track 4 - Track 4
  • Hacking the Smart Grid

    Mark Steward
    Sat, 15:30 - 15:50
    Turbo/Breakout Track - Turbo/Breakout
  • Hacking the Wiimote and Wii Fit to Help the Disabled

    Steven Adair, Sherri Davidoff, Matt Richard
    Fri, 11:30 - 11:50
    Track 2 - Track 2
  • Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything

    Mario Ceballos
    Fri, 18:30 - 19:20
    Turbo/Breakout Track - Turbo/Breakout
  • Hacking with GNURadio

    David Bryan
    Thu, 13:00 - 15:00
    Track 4 - Track 4
  • Hacking WITH the iPod Touch

    Christopher Mooney
    Fri, 13:00 - 13:50
    Track 3 - Track 3
  • Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor

    MD Sohail Ahmad, Prabhash Dhyani
    Sun, 11:00 - 11:20
    Turbo/Breakout Track - Turbo/Breakout
  • Hack The Textbook

    Pedro Joaquin, Tyler Pitchford
    Sun, 11:30 - 11:50
    Turbo/Breakout Track - Turbo/Breakout
  • Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework

    Haroon Meer, Jayson E. Street
    Sat, 16:00 - 16:50
    Track 4 - Track 4
  • Hardware Black Magic - Building devices with FPGAs

    David Bryan, Rodney McGee
    Thu, 13:00 - 16:00
    Track 3 - Track 3
  • Hardware Trojans: Infiltrating the Faraday Cage

    Joey Calca, Oliver Day
    Sat, 14:30 - 14:50
    Turbo/Breakout Track - Turbo/Breakout
  • Hello, My Name is /hostname/

    Keith Biddulph, Nick Harbour, Chris Tarnovsky
    Sun, 10:00 - 10:50
    Track 1 - Track 1
  • Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training

    Anonymous Speaker
    Sat, 15:00 - 15:50
    Track 4 - Track 4
  • "
  • "I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks"

    Dmitri Alperovitch
    Sat, 17:00 - 17:50
    Track 3 - Track 3
  • I
  • Identifying, Exploring, and Predicting Threats in the Russian Hacker Community

    Val Smith
    Sat, 13:00 - 13:50
    Track 3 - Track 3
  • Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers

    Colin Ames, Sho Ho, David Kerb
    Sat, 13:00 - 13:50
    Track 4 - Track 4
  • Injecting Electromagnetic Pulses into Digital Devices

    Mike Convertino
    Fri, 17:30 - 18:20
    Turbo/Breakout Track - Turbo/Breakout
  • Introduction to WiMAX Hacking

    Peter Guerra, Mark McGovern
    Sun, 16:00 - 16:50
    Track 1 - Track 1
  • Invisible Access: Electronic Access Control, Audit Trails and "High Security"

    Michael L. Davis, etd, Magen Hughes
    Sun, 11:00 - 11:50
    Track 4 - Track 4
  • Is That You, Baby, or Just a Bridge in the Sky?

    Rob Rehrig
    Fri, 11:00 - 23:59
    Track 4 - Track 4
  • Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices

    Rod Beckstrom, jhind, Anthony Lineberry
    Fri, 10:00 - 10:50
    Track 3 - Track 3
  • J
  • Jailbreaking and the Law of Reversing

    Grant Jordan, Josh Marks
    Fri, 11:00 - 11:50
    Track 3 - Track 3
  • L
  • Locally Exploiting Wireless Sensors

    Chris Gates
    Fri, 18:30 - 19:20
    Track 2 - Track 2
  • Lockpicking Forensics

    Beth
    Sun, 13:00 - 13:50
    Track 4 - Track 4
  • M
  • Macsploitation with Metasploit

    Tiffany Rad
    Sat, 18:10 - 18:40
    Track 2 - Track 2
  • Making Fun of Your Malware

    Robert Clark, Jason Scott
    Fri, 14:30 - 14:50
    Track 1 - Track 1
  • Malware Freak Show

    David Aslanian, Daniel Raygoza
    Fri, 16:30 - 17:20
    Track 1 - Track 1
  • Managed Code Rootkits - Hooking into Runtime Environments

    Marc Weber Tobias
    Sun, 10:00 - 10:50
    Track 3 - Track 3
  • Manipulation and Abuse of the Consumer Credit Reporting Agencies

    Marco Slaviero
    Sat, 16:00 - 16:20
    Turbo/Breakout Track - Turbo/Breakout
  • Maximum CTF: Getting the Most Out of Capture the Flag

    Jon Rose
    Fri, 13:00 - 13:50
    Track 2 - Track 2
  • Meet the Feds 2009

    Jake Appelbaum, Andy Fried, Greg Garcia, John Garris, Efstratios L. Gavas, Travis Goodspeed, Barry Grundy, John Hering, Bob Hopper, Jon Idonisi, Dan Kaminsky, Mischel Kwon, Kevin Manson, Rich Marshall, Ken Privette, Richard Thieme, Stephane Turgeon, Jamie Turner, Dr. Linton Wells II
    Fri, 18:00 - 19:50
    Track 4 - Track 4
  • MetaPhish

    Pratap Prabhu, Yingbo Song, Salvatore. J. Stolfo
    Sat, 14:00 - 15:50
    Track 2 - Track 2
  • Metasploit Autopsy: Recontructing the Crime Scene

    Iftach Ian Amit, Joseph McCray
    Sat, 18:50 - 19:20
    Track 2 - Track 2
  • Metasploit Evolved

     
    Sat, 16:10 - 16:40
    Track 2 - Track 2
  • Metasploit Goes Web

    Kevin Johnson
    Sat, 12:00 - 12:20
    Track 2 - Track 2
  • Meterpreter Advances

     
    Sat, 16:10 - 16:40
    Contest Area
  • More Tricks For Defeating SSL

    Thomas Wilhelm
    Fri, 12:30 - 13:20
    Track 1 - Track 1
  • MSF Telephony

    Michael Ossmann
    Sat, 15:30 - 16:00
    Track 3 - Track 3
  • MSF Wifi

    Nicholas Arvanitis
    Sat, 16:50 - 17:20
    Track 2 - Track 2
  • O
  • Old Skool Brought Back: A 1964 Modem Demo

    Dan Crowley, Righter Kunkel
    Sat, 10:00 - 10:50
    Turbo/Breakout Track - Turbo/Breakout
  • P
  • Packing and the Friendly Skies

    Deviant Ollam
    Sat, 12:00 - 12:20
    Turbo/Breakout Track - Turbo/Breakout
  • Personal Survival Preparedness

    Justin Searle
    Sat, 12:00 - 12:50
    Track 3 - Track 3
  • Perspective of the DoD Chief Security Officer

    John Hering
    Fri, 10:00 - 10:50
    Track 2 - Track 2
  • Picking Electronic Locks Using TCP Sequence Prediction

    Dominic Spill
    Sat, 15:30 - 15:50
    Track 1 - Track 1
  • PLA Information Warfare Development Timeline and Nodal Analysis

    Ryan Anguiano
    Sat, 15:00 - 16:50
    Track 3 - Track 3
  • Pre-Con Introduction to Lock Picking

    Kevin Estis
    Thu, 13:00 - 16:00
    Capri Rooms 103/104
  • Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World

    Tomer Bitton, Steve Davis, Itzik Kotler, Peter Silberman
    Sat, 18:00 - 20:00
    Track 3 - Track 3
  • Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)

    Matt Blaze
    Sun, 15:00 - 15:50
    Track 4 - Track 4
  • Proxy Prank-o-Matic

    Lorie M. Liebrock, Johnny Long
    Fri, 15:00 - 23:59
    Turbo/Breakout Track - Turbo/Breakout
  • Q
  • Q & A with Bruce Schneier

     
    Fri, 11:30 - 12:20
    Track 1 - Track 1
  • R
  • RAID Recovery: Recover your PORN by Sight and Sound

    Rafael Dominguez Vega
    Sun, 14:00 - 14:50
    Track 4 - Track 4
  • Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization

    Roger Dingledine, Kurt Opsahl
    Fri, 15:30 - 17:20
    Track 1 - Track 1
  • RFID MythBusting

    Dr. Thomas J. Holt
    Sat, 12:00 - 12:50
    Track 1 - Track 1
  • Robot Shark Laser! What Hackerspaces Do

    Professor Sudhir Aggarwal, Tom Eston, Pierce, Siviak, Matt Weir
    Sun, 15:00 - 15:50
    Track 1 - Track 1
  • Router Exploitation

    Bosse Eriksson
    Sat, 18:00 - 18:50
    Track 1 - Track 1
  • Runtime Kernel Patching on Mac OS X

    Erez Metula
    Sat, 18:30 - 18:50
    Turbo/Breakout Track - Turbo/Breakout
  • S
  • Screen Scraper Tricks: Extracting Data from Difficult Websites

    Antonio Rucci
    Sun, 14:00 - 14:50
    Track 3 - Track 3
  • Search And Seizure Explained - They Took My Laptop!

    Tyler Reguly
    Sun, 13:00 - 13:50
    Track 1 - Track 1
  • Session Donation

    Kevin Estis
    Fri, 15:30 - 15:50
    Turbo/Breakout Track - Turbo/Breakout
  • Sharepoint 2007 Knowledge Network Exposed

    James Luedke
    Sat, 18:00 - 18:20
    Turbo/Breakout Track - Turbo/Breakout
  • Skytalks

     
    Sun, 09:00 - 12:00
    Skybox 206
  • Slight of Mind: Magic and Social Engineering

    Dr. Fouad Kiamilev, Mark Ryan Del Moral Talabis
    Sun, 14:00 - 14:50
    Track 2 - Track 2
  • "
  • "Smart" Parking Meter Implementations, Globalism, and You(aka Meter Maids Eat Their Young)

    Roberto Suggi Liverani, Shawn Moyer, Michael Schearer
    Sat, 10:00 - 10:50
    Track 1 - Track 1
  • S
  • Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode

    I)ruid, Ricky Lawshae, Sumit Siddharth
    Sat, 14:00 - 14:20
    Turbo/Breakout Track - Turbo/Breakout
  • Sniff Keystrokes With Lasers/Voltmeters

     
    Sat, 16:00 - 16:50
    Track 1 - Track 1
  • Socially Owned in the Cloud

    James Luedke
    Fri, 13:00 - 13:20
    Turbo/Breakout Track - Turbo/Breakout
  • Social Zombies: Your Friends Want to Eat Your Brains

    Colin Ames, Rick Farina
    Sun, 16:00 - 16:50
    Track 2 - Track 2
  • Something about Network Security

    Chris Tarnovsky
    Fri, 18:30 - 19:20
    Track 1 - Track 1
  • So You Got Arrested in Vegas...

    Robert F. Lentz
    Thu, 16:30 - 17:00
    Track 1 - Track 1
  • Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam

    Michael Brooks
    Fri, 16:00 - 16:50
    Turbo/Breakout Track - Turbo/Breakout
  • Subverting the World Of Warcraft API

    David Mortman, Arjun Sambamoorthy
    Fri, 14:00 - 14:50
    Track 2 - Track 2
  • T
  • Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data

    Scott Moulton, Marsh Ray
    Sun, 13:00 - 13:50
    Track 3 - Track 3
  • TBA

     
    Fri, 12:00 - 12:50
    Track 2 - Track 2
  • That Awesome Time I Was Sued For Two Billion Dollars

    "Anonymous secondary speaker"
    Fri, 15:00 - 15:50
    Track 2 - Track 2
  • The Day of the Updates

    Ava Latrope, Ne0nRa1n
    Sat, 19:00 - 19:50
    Turbo/Breakout Track - Turbo/Breakout
  • The Making of the second SQL injection Worm

    Mike Kershaw
    Sat, 15:00 - 15:20
    Turbo/Breakout Track - Turbo/Breakout
  • The Middler 2.0: It's Not Just for Web Apps Anymore

    Endgrain, David Kerb
    Sat, 18:00 - 18:50
    Track 4 - Track 4
  • The Projects of "Prototype This!"

    Roberto Suggi Liverani
    Sat, 14:00 - 14:50
    Track 1 - Track 1
  • The Psychology of Security Unusability

    Ben Sangster
    Sun, 16:00 - 16:50
    Track 4 - Track 4
  • The security risks of Web 2.0

    Frank DiMaggio
    Sat, 12:00 - 12:50
    Track 4 - Track 4
  • The Year In Computer Crime Cases

    Josh Marks
    Fri, 13:30 - 14:20
    Track 1 - Track 1
  • three point Oh.

    Kevin Bankston
    Fri, 16:00 - 16:50
    Track 2 - Track 2
  • U
  • Unfair Use - Speculations on the Future of Piracy

    Lockheed
    Sat, 13:00 - 13:50
    Turbo/Breakout Track - Turbo/Breakout
  • Unmasking You

    Charlie Miller, Matthew Richard
    Sun, 12:00 - 12:50
    Track 1 - Track 1
  • USB Attacks: Fun with Plug & 0wn

    G. Mark Hardy
    Sun, 15:00 - 15:50
    Turbo/Breakout Track - Turbo/Breakout
  • Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit

     
    Sat, 11:00 - 11:50
    Track 2 - Track 2
  • W
  • Weaponizing the Web: New Attacks on User-generated Content

    Mike Bailey, Russ McRee
    Sat, 10:00 - 10:50
    Track 4 - Track 4
  • Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge

    Roberto Suggi Liverani, Jeff Moss
    Fri, 10:00 - 11:20
    Track 1 - Track 1
  • Who Invented the Proximity Card?

    Damian Finol
    Sun, 12:00 - 12:50
    Track 4 - Track 4
  • Why Tor is Slow, and What We're Doing About It

    Fred von Lohmann
    Fri, 16:00 - 16:50
    Track 3 - Track 3
  • Wi-Fish Finder: Who Will Bite the Bait

    Da Beave, JFalcon
    Sun, 12:00 - 12:20
    Turbo/Breakout Track - Turbo/Breakout
  • Win at Reversing: Tracing and Sandboxing through Inline Hooking

    Mike Cooper
    Sun, 11:00 - 11:50
    Track 3 - Track 3
  • World of Warcraft Subversion

     
    Sun, 10:00 - 17:00
    Contest Area
  • Y
  • Your Mind: Legal Status, Rights and Securing Yourself

    Nick Harbour, Michael Schrenk
    Sun, 13:00 - 13:50
    Track 2 - Track 2