10:00 |
Chen,
Dungan
|
Biology for Hackers and Hacking for Biology |
Catalyst
|
The Phuture of Phreaking |
|
11:00 |
Barnes
|
I "Hacked" for China |
Heath,
Rege
|
What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture |
|
Bethany,
Koval,
Laufer
|
How to Torrent a Pharmaceutical Drug |
|
12:00 |
Bowne,
Muentz
|
When Vulnerability Disclosure Turns Ugly |
Mitnick,
Stepanovich
|
Who's Killing Crypto? |
|
Canto
|
Matehacking: Legalizing Autonomous Production and Permaculture - Establishing a Hack Farm |
|
13:00 |
Coleman
|
How Anonymous Narrowly Evaded Being Framed as Cyberterrorists |
Cagle,
Friend,
Hirose
|
Only You Can Stop Police Surveillance - Here's How |
|
Huntington
|
Show Networks |
|
14:00 |
Megagiannis,
Urbelis
|
The Panama Papers and the Law Firm Behind It: Shady Lawyers Caught With Their Pants Down |
Décary-Hétu,
Lavoie
|
De-Anonymizing Bitcoin One Transaction at a Time |
|
Pearlman
|
Is the Brain the Next Hackable Driver? |
|
15:00 |
Brown,
Higgins,
Hoffman-Andrews,
Opsahl
|
Ask the EFF: The Year in Digital Civil Liberties |
Burke,
Pesner,
Yadao
|
Your Level-Building Tool is Our Sound Stage |
|
Zhao
|
Chinese Mechanical Locks - Insight into a Hidden World of Locks |
|
16:00 |
asn,
Fatemi,
Goulet
|
The Onion Report |
Evenchick,
Smith
|
2016 Car Hacking Tools |
|
Francoise,
Geffen,
Knodel,
Milan
|
The Securitization of Cyberspace and Its Impact on Human Rights |
|
17:00 |
Blaze,
Clark
|
Crypto War II: Updates from the Trenches |
Shevinsky
|
Censorship, Social Media, and the Presidential Election |
|
Patel
|
Accessibility: A Creative Solution to Living without Sight |
|
18:00 |
Budington,
Quintin
|
Privacy Badger and Panopticlick vs. the Trackers, Round 1 |
Aljammaz,
Valsorda
|
The Code Archive |
|
Crowbar
|
How to Start a Crypto Party |
|
19:00 |
TOOOL
|
LockSport Roadshow: Bring Your Oddities! |
Baykurt,
Cropcho,
Dean
|
Smart Cities and Blockchains: New Techno-Utopian Dreams or Nightmares? |
|
Goren
|
Tuning in to New York City's Pirates of the Air |
|
20:00 |
Robinson
|
SecureDrop: Two Years on and Beyond |
Mastoris
|
A Penetration Tester's Guide to the Azure Cloud |
|
Williams-King
|
Coding by Voice with Open Source Speech Recognition |
|
21:00 |
Atkinson
|
Slicing and Dicing Espionage: The Technical Aspect of Hunting Spies |
TProphet
|
Seven Continents: A Telecom Informer World Tour |
|
Krum
|
Mesh VPN with Service Discovery |
|
22:00 |
Polich
|
Hacking Machine Learning Algorithms |
Merrill
|
National Security Letters: The Checks and Balances Aren't Strong Enough - Sometimes They're Nonexistent |
|
Grenzfurthner
|
Movie: Traceroute |
|
23:00 |
Beaches,
Bunni3burn,
Nikgod,
Stoppay,
TechDarko,
Xmas
|
F*ck it, We'll Do It Live: Eight Years of Radio Statler! |
Lackey
|
Security Options for High Risk Travelers |
10:00 |
Fahey
|
Monitoring Dusty War Zones and Tropical Paradises - Being a Broadcast Anthropologist |
Kubecka,
Sterling
|
Water Security: Are We in De-Nile or In-Seine? Water Policies, Availability, Geeks Without Bounds and You |
|
Marthews
|
Surveillance Gives Me Chills |
|
11:00 |
Colvin,
Radack,
Shenkman
|
Leak Hypocrisy: A Conversation on Whistleblowers, Sources, and the Label "Espionage" |
Forscey,
Frankston,
Gustin,
Lopez,
Pesner,
Sowell
|
What is a "Neutral Network" Anyway? An Exploration and Rediscovery of the Aims of Net Neutrality in Theory and Practice |
|
Beale
|
Orbital Mechanics Ate My Weblog |
|
12:00 |
Cullen,
Gondek,
Pollack,
Seubert,
Strobel
|
Women in Cyber Security |
asn,
Fatemi,
Goulet
|
Understanding Tor Onion Services and Their Use Cases |
|
XioNYC
|
When Video Is Not Standard Output |
|
13:00 |
Doctorow
|
Keynote Address |
15:00 |
Jaffer,
Pozen
|
FOIA at Fifty |
Brand,
Erven
|
Medical Devices: Pwnage and Honeypots |
|
Llewellyn
|
Building Your Own Tor-centric ISP for Fun and (non)Profit |
|
16:00 |
0wl,
Ollam,
Power
|
Lockpicking in Real Life versus on the Screen |
Greenberg,
Horowitz,
O'Neill,
Winter
|
The Silk Road to Life without Parole - A Deeper Look at the Trial of Ross Ulbricht |
|
Howe
|
Bring the Noise: Ten Years of Obfuscation as Counter-Surveillance |
|
17:00 |
Rambam
|
Privacy, Anonymity, and Individuality - The Final Battle Begins |
Andrews
|
Detour Through Their Minds: How Everyday People Think the Internet Works |
|
Kernfeld
|
The Ownerless Library |
|
18:00 |
Blanc,
Nicholson
|
All Ages: How to Build a Movement |
Chow,
Wattanasin
|
Computer Science Curricula's Failure - What Can We Do Now? |
|
19:00 |
Stubbs
|
Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure |
Lowenthal
|
Won't Somebody Please Think of the Journalists? |
|
20:00 |
Castellucci,
Valsorda
|
Stealing Bitcoin with Math |
Grenzfurthner
|
What the Fuck Are You Talking About? Storytelling for Hackers |
|
Alli
|
Hacking DNA: Heritage and Health Care |
|
21:00 |
Goldstein
|
Social Engineering |
Simmons
|
Open Source Malware Lab |
|
22:00 |
Scott
|
Now and Then, Here and There |
Holst,
Urbelis
|
Code Is from Mars, the Courts Are from Venus: Reverse Engineering Legal Developments on Reverse Engineering |
|
Cantino,
Lum
|
Information Overload and the "Last Foot" Problem |
|
23:00 |
0wl,
DarkSim905,
Xmas
|
The TSA Keys Leak: Government Backdoors and the Dangers of Security Theater |
dr_dave,
r3dfish
|
CAPTCHAs - Building and Breaking |
|
Joshua
|
Attacking the Source: Surreptitious Software Features (and How to Become Extremely Paranoid) |
10:00 |
Hoffman-Andrews
|
The Next Billion Certificates: Let's Encrypt and Scaling the Web PKI |
Colvin,
Fuller,
Love,
North,
Shenkman,
Zhu
|
Hackers Are Whistleblowers Too: Practical Solidarity with the Courage Foundation |
|
Hernandez
|
Go Hack Yourself! |
|
11:00 |
Dean,
Hirose
|
LinkNYC Spy Stations |
Koblentz
|
What Really Happened? Fact, Truth, and Research Techniques |
|
Henry
|
FOIA and Public Records Hacking: How to Complete a FOIA Request or Dox Yourself via the Privacy Act |
|
12:00 |
Stallman
|
Freedom and Privacy in Our Lives, Our Governments, and Our Schools |
schneider,
Zehl
|
Iridium Satellite Hacking |
|
Bandini
|
Presidential Twitter Bot Experience |
|
13:00 |
int0x80
|
Anti-Forensics AF |
Platt
|
Censorship- and Coercion-Resistant Network Architectures |
|
14:00 |
Muentz
|
Can We Sue Ourselves Secure? The Legal System's Role in Protecting Us in the Era of Mass Data Leaks and Internet of Things |
Doctor
|
Constructing Exocortices with Huginn and Halo |
|
Goldstein
|
Sunset or Evolution of the PSTN? |
|
15:00 |
Ollam,
Payne
|
This Key is Your Key, This Key is My Key |
aestetix,
Hofer
|
Spy Hard with a Vengeance: How One City Stood up to the Department of Homeland Security |
|
Iseman,
Stewart
|
Hacking Housing |
|
16:00 |
Wheeler
|
The Black Holes in Our Surveillance Map |
Keenan
|
Come into My (Biohacking) Lab and See What's on the Slab |
|
Bushehri
|
Democratizing Wireless Networks with LimeSDR: Open Source, Field-Programmable RF Technology |
|
17:00 |
Hallam-Baker
|
The Mathematical Mesh and the New Cryptography |
Altman,
Auriti,
Beckwith,
Dubin-Thaler,
Fried,
Torrone
|
Hacking through Business: Theory and Logistics |
|
Libert
|
Deconstructing Ad Networks for Fun and Profit |
|
18:00 |
Hecker
|
Bringing Down the Great Cryptowall |
19:00 | Closing Ceremonies |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.