Biology for Hackers and Hacking for Biology
I "Hacked" for China
When Vulnerability Disclosure Turns Ugly
How Anonymous Narrowly Evaded Being Framed as Cyberterrorists
The Panama Papers and the Law Firm Behind It: Shady Lawyers Caught With Their Pants Down
Ask the EFF: The Year in Digital Civil Liberties
The Onion Report
Crypto War II: Updates from the Trenches
Privacy Badger and Panopticlick vs. the Trackers, Round 1
LockSport Roadshow: Bring Your Oddities!
SecureDrop: Two Years on and Beyond
Slicing and Dicing Espionage: The Technical Aspect of Hunting Spies
Hacking Machine Learning Algorithms
F*ck it, We'll Do It Live: Eight Years of Radio Statler!
Monitoring Dusty War Zones and Tropical Paradises - Being a Broadcast Anthropologist
Leak Hypocrisy: A Conversation on Whistleblowers, Sources, and the Label "Espionage"
Women in Cyber Security
Keynote Address
FOIA at Fifty
Lockpicking in Real Life versus on the Screen
Privacy, Anonymity, and Individuality - The Final Battle Begins
Stealing Bitcoin with Math
Social Engineering
Now and Then, Here and There
The TSA Keys Leak: Government Backdoors and the Dangers of Security Theater
The Next Billion Certificates: Let's Encrypt and Scaling the Web PKI
LinkNYC Spy Stations
Freedom and Privacy in Our Lives, Our Governments, and Our Schools
Can We Sue Ourselves Secure? The Legal System's Role in Protecting Us in the Era of Mass Data Leaks and Internet of Things
This Key is Your Key, This Key is My Key
The Black Holes in Our Surveillance Map
The Mathematical Mesh and the New Cryptography
Bringing Down the Great Cryptowall
Closing Ceremonies