The Eleventh Hope - Friday, July 22
10:00
Chen, Dungan
Biology for Hackers and Hacking for Biology
Catalyst
The Phuture of Phreaking
11:00
Barnes
I "Hacked" for China
Heath, Rege
What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture
Bethany, Koval, Laufer
How to Torrent a Pharmaceutical Drug
12:00
Bowne, Muentz
When Vulnerability Disclosure Turns Ugly
Mitnick, Stepanovich
Who's Killing Crypto?
Canto
Matehacking: Legalizing Autonomous Production and Permaculture - Establishing a Hack Farm
13:00
Coleman
How Anonymous Narrowly Evaded Being Framed as Cyberterrorists
Cagle, Friend, Hirose
Only You Can Stop Police Surveillance - Here's How
Huntington
Show Networks
14:00
Megagiannis, Urbelis
The Panama Papers and the Law Firm Behind It: Shady Lawyers Caught With Their Pants Down
Décary-Hétu, Lavoie
De-Anonymizing Bitcoin One Transaction at a Time
Pearlman
Is the Brain the Next Hackable Driver?
15:00
Brown, Higgins, Hoffman-Andrews, Opsahl
Ask the EFF: The Year in Digital Civil Liberties
Burke, Pesner, Yadao
Your Level-Building Tool is Our Sound Stage
Zhao
Chinese Mechanical Locks - Insight into a Hidden World of Locks
16:00
asn, Fatemi, Goulet
The Onion Report
Evenchick, Smith
2016 Car Hacking Tools
Francoise, Geffen, Knodel, Milan
The Securitization of Cyberspace and Its Impact on Human Rights
17:00
Blaze, Clark
Crypto War II: Updates from the Trenches
Shevinsky
Censorship, Social Media, and the Presidential Election
Patel
Accessibility: A Creative Solution to Living without Sight
18:00
Budington, Quintin
Privacy Badger and Panopticlick vs. the Trackers, Round 1
Aljammaz, Valsorda
The Code Archive
Crowbar
How to Start a Crypto Party
19:00
TOOOL
LockSport Roadshow: Bring Your Oddities!
Baykurt, Cropcho, Dean
Smart Cities and Blockchains: New Techno-Utopian Dreams or Nightmares?
Goren
Tuning in to New York City's Pirates of the Air
20:00
Robinson
SecureDrop: Two Years on and Beyond
Mastoris
A Penetration Tester's Guide to the Azure Cloud
Williams-King
Coding by Voice with Open Source Speech Recognition
21:00
Atkinson
Slicing and Dicing Espionage: The Technical Aspect of Hunting Spies
TProphet
Seven Continents: A Telecom Informer World Tour
Krum
Mesh VPN with Service Discovery
22:00
Polich
Hacking Machine Learning Algorithms
Merrill
National Security Letters: The Checks and Balances Aren't Strong Enough - Sometimes They're Nonexistent
Grenzfurthner
Movie: Traceroute
23:00
Beaches, Bunni3burn, Nikgod, Stoppay, TechDarko, Xmas
F*ck it, We'll Do It Live: Eight Years of Radio Statler!
Lackey
Security Options for High Risk Travelers
The Eleventh Hope - Saturday, July 23
10:00
Fahey
Monitoring Dusty War Zones and Tropical Paradises - Being a Broadcast Anthropologist
Kubecka, Sterling
Water Security: Are We in De-Nile or In-Seine? Water Policies, Availability, Geeks Without Bounds and You
Marthews
Surveillance Gives Me Chills
11:00
Colvin, Radack, Shenkman
Leak Hypocrisy: A Conversation on Whistleblowers, Sources, and the Label "Espionage"
Forscey, Frankston, Gustin, Lopez, Pesner, Sowell
What is a "Neutral Network" Anyway? An Exploration and Rediscovery of the Aims of Net Neutrality in Theory and Practice
Beale
Orbital Mechanics Ate My Weblog
12:00
Cullen, Gondek, Pollack, Seubert, Strobel
Women in Cyber Security
asn, Fatemi, Goulet
Understanding Tor Onion Services and Their Use Cases
XioNYC
When Video Is Not Standard Output
13:00
Doctorow
Keynote Address
15:00
Jaffer, Pozen
FOIA at Fifty
Brand, Erven
Medical Devices: Pwnage and Honeypots
Llewellyn
Building Your Own Tor-centric ISP for Fun and (non)Profit
16:00
0wl, Ollam, Power
Lockpicking in Real Life versus on the Screen
Greenberg, Horowitz, O'Neill, Winter
The Silk Road to Life without Parole - A Deeper Look at the Trial of Ross Ulbricht
Howe
Bring the Noise: Ten Years of Obfuscation as Counter-Surveillance
17:00
Rambam
Privacy, Anonymity, and Individuality - The Final Battle Begins
Andrews
Detour Through Their Minds: How Everyday People Think the Internet Works
Kernfeld
The Ownerless Library
18:00
Blanc, Nicholson
All Ages: How to Build a Movement
Chow, Wattanasin
Computer Science Curricula's Failure - What Can We Do Now?
19:00
Stubbs
Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure
Lowenthal
Won't Somebody Please Think of the Journalists?
20:00
Castellucci, Valsorda
Stealing Bitcoin with Math
Grenzfurthner
What the Fuck Are You Talking About? Storytelling for Hackers
Alli
Hacking DNA: Heritage and Health Care
21:00
Goldstein
Social Engineering
Simmons
Open Source Malware Lab
22:00
Scott
Now and Then, Here and There
Holst, Urbelis
Code Is from Mars, the Courts Are from Venus: Reverse Engineering Legal Developments on Reverse Engineering
Cantino, Lum
Information Overload and the "Last Foot" Problem
23:00
0wl, DarkSim905, Xmas
The TSA Keys Leak: Government Backdoors and the Dangers of Security Theater
dr_dave, r3dfish
CAPTCHAs - Building and Breaking
Joshua
Attacking the Source: Surreptitious Software Features (and How to Become Extremely Paranoid)
The Eleventh Hope - Sunday, July 24
10:00
Hoffman-Andrews
The Next Billion Certificates: Let's Encrypt and Scaling the Web PKI
Colvin, Fuller, Love, North, Shenkman, Zhu
Hackers Are Whistleblowers Too: Practical Solidarity with the Courage Foundation
Hernandez
Go Hack Yourself!
11:00
Dean, Hirose
LinkNYC Spy Stations
Koblentz
What Really Happened? Fact, Truth, and Research Techniques
Henry
FOIA and Public Records Hacking: How to Complete a FOIA Request or Dox Yourself via the Privacy Act
12:00
Stallman
Freedom and Privacy in Our Lives, Our Governments, and Our Schools
schneider, Zehl
Iridium Satellite Hacking
Bandini
Presidential Twitter Bot Experience
13:00
int0x80
Anti-Forensics AF
Platt
Censorship- and Coercion-Resistant Network Architectures
14:00
Muentz
Can We Sue Ourselves Secure? The Legal System's Role in Protecting Us in the Era of Mass Data Leaks and Internet of Things
Doctor
Constructing Exocortices with Huginn and Halo
Goldstein
Sunset or Evolution of the PSTN?
15:00
Ollam, Payne
This Key is Your Key, This Key is My Key
aestetix, Hofer
Spy Hard with a Vengeance: How One City Stood up to the Department of Homeland Security
Iseman, Stewart
Hacking Housing
16:00
Wheeler
The Black Holes in Our Surveillance Map
Keenan
Come into My (Biohacking) Lab and See What's on the Slab
Bushehri
Democratizing Wireless Networks with LimeSDR: Open Source, Field-Programmable RF Technology
17:00
Hallam-Baker
The Mathematical Mesh and the New Cryptography
Altman, Auriti, Beckwith, Dubin-Thaler, Fried, Torrone
Hacking through Business: Theory and Logistics
Libert
Deconstructing Ad Networks for Fun and Profit
18:00
Hecker
Bringing Down the Great Cryptowall
19:00
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.