2016 Car Hacking Tools
Accessibility: A Creative Solution to Living without Sight
All Ages: How to Build a Movement
Anti-Forensics AF
A Penetration Tester's Guide to the Azure Cloud
Ask the EFF: The Year in Digital Civil Liberties
Attacking the Source: Surreptitious Software Features (and How to Become Extremely Paranoid)
Biology for Hackers and Hacking for Biology
Bringing Down the Great Cryptowall
Bring the Noise: Ten Years of Obfuscation as Counter-Surveillance
Building Your Own Tor-centric ISP for Fun and (non)Profit
Can We Sue Ourselves Secure? The Legal System's Role in Protecting Us in the Era of Mass Data Leaks and Internet of Things
CAPTCHAs - Building and Breaking
Censorship- and Coercion-Resistant Network Architectures
Censorship, Social Media, and the Presidential Election
Chinese Mechanical Locks - Insight into a Hidden World of Locks
Closing Ceremonies
Code Is from Mars, the Courts Are from Venus: Reverse Engineering Legal Developments on Reverse Engineering
Coding by Voice with Open Source Speech Recognition
Come into My (Biohacking) Lab and See What's on the Slab
Computer Science Curricula's Failure - What Can We Do Now?
Constructing Exocortices with Huginn and Halo
Crypto War II: Updates from the Trenches
De-Anonymizing Bitcoin One Transaction at a Time
Deconstructing Ad Networks for Fun and Profit
Democratizing Wireless Networks with LimeSDR: Open Source, Field-Programmable RF Technology
Detour Through Their Minds: How Everyday People Think the Internet Works
F*ck it, We'll Do It Live: Eight Years of Radio Statler!
FOIA and Public Records Hacking: How to Complete a FOIA Request or Dox Yourself via the Privacy Act
FOIA at Fifty
Freedom and Privacy in Our Lives, Our Governments, and Our Schools
Go Hack Yourself!
Hackers Are Whistleblowers Too: Practical Solidarity with the Courage Foundation
Hacking DNA: Heritage and Health Care
Hacking Housing
Hacking Machine Learning Algorithms
Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure
Hacking through Business: Theory and Logistics
How Anonymous Narrowly Evaded Being Framed as Cyberterrorists
How to Start a Crypto Party
How to Torrent a Pharmaceutical Drug
I "Hacked" for China
Information Overload and the "Last Foot" Problem
Iridium Satellite Hacking
Is the Brain the Next Hackable Driver?
Keynote Address
Leak Hypocrisy: A Conversation on Whistleblowers, Sources, and the Label "Espionage"
LinkNYC Spy Stations
Lockpicking in Real Life versus on the Screen
LockSport Roadshow: Bring Your Oddities!
Matehacking: Legalizing Autonomous Production and Permaculture - Establishing a Hack Farm
Medical Devices: Pwnage and Honeypots
Mesh VPN with Service Discovery
Monitoring Dusty War Zones and Tropical Paradises - Being a Broadcast Anthropologist
Movie: Traceroute
National Security Letters: The Checks and Balances Aren't Strong Enough - Sometimes They're Nonexistent
Now and Then, Here and There
Only You Can Stop Police Surveillance - Here's How
Open Source Malware Lab
Orbital Mechanics Ate My Weblog
Presidential Twitter Bot Experience
Privacy, Anonymity, and Individuality - The Final Battle Begins
Privacy Badger and Panopticlick vs. the Trackers, Round 1
SecureDrop: Two Years on and Beyond
Security Options for High Risk Travelers
Seven Continents: A Telecom Informer World Tour
Show Networks
Slicing and Dicing Espionage: The Technical Aspect of Hunting Spies
Smart Cities and Blockchains: New Techno-Utopian Dreams or Nightmares?
Social Engineering
Spy Hard with a Vengeance: How One City Stood up to the Department of Homeland Security
Stealing Bitcoin with Math
Sunset or Evolution of the PSTN?
Surveillance Gives Me Chills
The Black Holes in Our Surveillance Map
The Code Archive
The Mathematical Mesh and the New Cryptography
The Next Billion Certificates: Let's Encrypt and Scaling the Web PKI
The Onion Report
The Ownerless Library
The Panama Papers and the Law Firm Behind It: Shady Lawyers Caught With Their Pants Down
The Phuture of Phreaking
The Securitization of Cyberspace and Its Impact on Human Rights
The Silk Road to Life without Parole - A Deeper Look at the Trial of Ross Ulbricht
The TSA Keys Leak: Government Backdoors and the Dangers of Security Theater
This Key is Your Key, This Key is My Key
Tuning in to New York City's Pirates of the Air
Understanding Tor Onion Services and Their Use Cases
Water Security: Are We in De-Nile or In-Seine? Water Policies, Availability, Geeks Without Bounds and You
What is a "Neutral Network" Anyway? An Exploration and Rediscovery of the Aims of Net Neutrality in Theory and Practice
What Really Happened? Fact, Truth, and Research Techniques
What the Fuck Are You Talking About? Storytelling for Hackers
What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture
When Video Is Not Standard Output
When Vulnerability Disclosure Turns Ugly
Who's Killing Crypto?
Women in Cyber Security
Won't Somebody Please Think of the Journalists?
Your Level-Building Tool is Our Sound Stage