The Next Billion Certificates: Let's Encrypt and Scaling the Web PKI
Hackers Are Whistleblowers Too: Practical Solidarity with the Courage Foundation
Go Hack Yourself!
LinkNYC Spy Stations
What Really Happened? Fact, Truth, and Research Techniques
FOIA and Public Records Hacking: How to Complete a FOIA Request or Dox Yourself via the Privacy Act
Freedom and Privacy in Our Lives, Our Governments, and Our Schools
Iridium Satellite Hacking
Presidential Twitter Bot Experience
Anti-Forensics AF
Censorship- and Coercion-Resistant Network Architectures
Can We Sue Ourselves Secure? The Legal System's Role in Protecting Us in the Era of Mass Data Leaks and Internet of Things
Constructing Exocortices with Huginn and Halo
Sunset or Evolution of the PSTN?
This Key is Your Key, This Key is My Key
Spy Hard with a Vengeance: How One City Stood up to the Department of Homeland Security
Hacking Housing
The Black Holes in Our Surveillance Map
Come into My (Biohacking) Lab and See What's on the Slab
Democratizing Wireless Networks with LimeSDR: Open Source, Field-Programmable RF Technology
The Mathematical Mesh and the New Cryptography
Hacking through Business: Theory and Logistics
Deconstructing Ad Networks for Fun and Profit
Bringing Down the Great Cryptowall
Closing Ceremonies