263
263
Jun 26, 2012
06/12
by
ShmooCon
movies
eye 263
favorite 0
comment 0
All Your Apps Axelle- Defeating MTANG Coyne-Defenses of Data Extrations Crenshaw-USB Crowley-URL_enlargement Davidson-Labs_College Dunlop-AndroidRE Edwards-AYD Friedburg-Fun With Flow Gavin-DLP Gutierrez- Attacking Google Web Toolkit Hoffmann-SnS Klinedinst-Modelling of Real-Time Security Events Kovach-Hairspray Detector Larimer-USB_AutoRun Long-Hack_Planet McNabb- Hacking Smartwaves Moulton-PaperweightHD Mudge-Keynote Oakley- Exploting Dwart Pawleski- Intersect Root Potter- Opening Remarks...
Topics: shmoocon, hacker, conference
5,826
5.8K
Jun 28, 2012
06/12
by
ShmooCon
movies
eye 5,826
favorite 2
comment 0
ShmooCon 2009 2009 Presentations Keynote: Matt Blaze Since 2004, Matt Blaze has been a computer science professor at the University of Pennsylvania; prior to that, he spent a dozen years on the research staff of AT&T (Bell) Labs. Matt's work focuses on cryptography and its applications, trust management, physical and human scale security, designing secure systems, and networking and distributed computing. He's particularly interested in security related to public policy, such as...
Topics: shmoocon, hacker, conference
Subtitle: Adventures in Curating HackerTwitter’s Institutional Knowledge Our community is defined by our dedication to sharing process, resources, and knowledge freely with each other—yet, we lack a coherent strategy for keeping the firehose of information organized adequately for hackers and hacklings alike. The Sisyphean task of keeping up with the day’s developments plagues the busy professional, but Twitter’s algorithms rarely suit our purposes. Hackers (of all people!) ought to be...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, 1337list
Sarah Zatko, Tim Carstens, Parker Thompson, Peiter “Mudge” Zatko, and Patrick Stach Software vendors like to claim that their software is secure, but the effort and techniques applied to this end vary significantly across the industry. From an end-user’s perspective, how do you identify those vendors who are effective at securing their software? From a vendor’s perspective, how do you identify those techniques which are effective at improving security? Where are the longitudinal studies...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, CITL
While reverse engineering, an annoying malware sample broke my Hex-Ray’s decompiler – the “cheat code” of IDA Pro. In this talk, I’ll walk you through my exploration of the bug that causes HexRays to fail, hunting for the malware’s source, and finding the exact source code and compiler which was used to create the sample. I’ll wrap up by showing techniques that you can use make analysis of future malware samples like this one easier. Jon Erickson (@2130706433) is a Senior Staff...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=VOUqD8H2ZSs Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=Djv2R2muHCg Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
243
243
Jun 26, 2012
06/12
by
ShmooCon
movies
eye 243
favorite 0
comment 0
Our second ShmooCon was on January 13-15th 2006, at the Wardman Park Marriott Hotel. We sold out on December 20th at over 600 people. We had many improvements, including super-quick registrations and onsite video production. This was the first year for the Hacker Arcade. Bigger and better, we still had a great time, and we keep on learning. Keynote - Dan Geer Jon Stewart- Behavioral Malware Analysis Using Sandnets Dan Moniz, Patrick Stach- Breaking LanMan Forever Steve Manzuik - Network Policy...
Topics: shmoocon, hacker, conference
Less than three years after the Equation Group was discovered backdooring hard drive firmware, courses on how to create such backdoored firmware are available to the public. New exploits in BIOS/UEFI that enable bypassing OS and Hypervisor protections have become commonplace. Once compromised, remediation is virtually impossible; malicious firmware is perfectly positioned to block the very updates that would remove it. Truly defending against these threats requires a different...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, securing hardware
Co-authors: Joe Hall, Margaret MacAlpine, and Harri Hursti (Sorry, the title was too long to include all of you!) Modern electronic voting systems were introduced in the US at large scale after the passage of the 2002 Help America Vote Act. Almost from the moment they appeared, serious questions have been raised about the security and integrity of these systems. This talk will review the architecture of current E-voting systems, the security risks and attack surfaces inherent in these designs,...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, electronic voting
Dan Bourke Honeytokens are really useful. AWS tokens are also really useful, for you and your attackers. Together, they fight crime. Well, they let you know a crime is happening, which is similar, I guess. I’ll talk about SPACECRAB which lets you deploy a lot of AWS honey tokens with relatively little effort, and also what I learned from posting AWS keys on the internet repeatedly. I can’t tell you what I learned in this abstract because I haven’t done it yet. Stay tuned. Dan Bourke is a...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, AWS, SPACECRAB
6,904
6.9K
Jun 25, 2012
06/12
by
ShmooCon
movies
eye 6,904
favorite 3
comment 0
ShmooCon 2007 2007 Speakers Speaker Selection We promised to list our CFP selection commitee. This team reviewed a ton of quality papers. A true thanks goes out to these folks: 3ric, Bob Fleck, cazz, cowboym, freshman, gdead, Johnny Long, Ken Caruso (ipl31), Shmoo Manchu, w0mbat ------------------------------------------------------------------------------------------------- Keynote Speaker - Avi Rubin Bio Dr. Aviel D. Rubin is Professor of Computer Science and Technical Director of the...
Topics: shmoocon, hacker, conferenc
2,333
2.3K
Jun 24, 2012
06/12
by
ShmooCon
movies
eye 2,333
favorite 1
comment 0
Agre- New Cool Crypo Antoniewicsz- Attacking Proximity Card Access Systems Atlas of Doom- Ghz or Bust! Benninger, Sobell-Intro to Near-Field Communication Berthaume- Java Backdoors and Cross Framework Abuse Bowers- Building Measurement and Signature Intelligence Bruce "The Shmoo" Potter- Closing Remarks 2012 Bruce "The Shmoo" Potter- Opening Remarks 2012 Caroland, Conti- Lessions of the Kobayashi Maru Clark, Blaze, Nelson-Fisher, Elmore- Inside the OODA Loop Credit Card...
Topics: hacker, conference, shmoocon
With GDPR coming into effect on May 25, 2018, any organization handling EU citizen’s personal data should be prepared to comply with stricter privacy regulations or be ready to pay up to four percent of their global annual revenue in fines or €20,000,000. This is a substantial penalty for non-compliant companies, and does not focus just on companies based in Europe — it’s for ALL companies globally who do business in the EU. With just months remaining, the clock is ticking on companies...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, GDPR
A former CISO, a future CISO, and a hacker walk into a bar… a profound realization over cocktails: no kid dreams of being a CISO – nor should they. So we hatched a plan – send a Terminator unit back to the 90s and eliminate the role we know today, to save all humanity. We suck at robots and hot tub time machines are creepy so we settled on a Firetalk. As global spending on infosec is projected to eclipse $1 Trillion in the next 5 years, the failure rate will be near 100%. After 20+ years...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
For many years many of us “infosec” professionals have been working late into the midnight hours and enjoying certain libations as celebration of our wins and losses alike. In order to ensure everyone has the best possible options at their disposal, we are taking a journey together (a very, very fast one) to the north parts of the United Kingdom, and the near center of France. It’s not just Whiskey and Sparkling Wine, it’s Scotch and Bubbles (really Champagne)! Come join me on this...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
A (slightly irreverent) look at the most important laws, cases, regulations, and legally relevant (or, in some cases, irrelevant) cybersecurity issues during the most recent year–and maybe a little farther back if the item is particularly outrageous. Just the basic topic and fundamental principles are highlighted–most original legal texts are so complex–who would read them all the way through? Prior to moving to Texas, Professor Steve Black (@legalh4ck3r) taught at BYU, UNH, LSU, Syracuse...
Topics: Youtube, video, Science & Technology, hacking, shmoocon, shmoocon 2018, cyberlaw
Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that have been previously used, and to increase our skills to eventually be able to contribute to the wider security community. In addition, when a known exploit currently exists for a CVE, and our experiments yield different results from the known exploit, we must practice our critical thinking skills to determine the discrepancies, and to determine if any unstated...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, CVEs
Complete title: Everything You Wanted to Know About Creating an Insider Threat Program (But Were Afraid To Ask) Oh no! You just got tasked with creating THE Insider Threat Program for your organization! Where do you start? How do you start? This is the quickie speed brief I gave an old mentor at Starbucks recently. Tess Schrodinger (@TessSchrodinger) is a jack of all trades and a master of some. She has spoken at a variety of security conferences on such topics as counter-intelligence, insider...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
For thirteen years, we’ve chosen to stand up and share all the ins and outs and inner workings of the con. Why stop now? Join us to get the break down of budget, an insight to the CFP process, a breakdown of the hours it takes to put on a con like ShmooCon, and anything thing else you might want to talk about. This is an informative, fast paced, and generally fun session as Bruce dances on stage, and Heidi tries to hide from the mic. Seriously though–if you ever wanted to know How, When, or...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, 0wnthecon
Note: The audio cuts out at 5:42 and doesn't pick up again until 10:32. It's like this in the source material. Sorry for the inconvenience. We don’t need a Cyber Moonshot; we’ve got enough already. Computing technology is enabling multiple concurrent revolutions, in biotechnology, manufacturing, robotics, AI, and literal rocket engineering. These are our Moonshots, fueled by governments, companies, and tinkerers, powering the growth engine of the global economy and reshaping society. Our...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Donna F. Dodson is the Chief Cybersecurity Advisor for the National Institute of Standards and Technology (NIST). She is also the Director of NIST’s National Cybersecurity Center of Excellence (NCCoE). Donna oversees ITL’s cyber security program to conduct research, development and outreach necessary to provide standards, guidelines, tools, metrics and practices to protect the information and communication infrastructure. In addition, Donna guides ITL programs to support both national and...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, keynote
Systems that hide their firmware–often deep in readout-protected flash or hidden in encrypted ROM chips–have long stymied reverse engineers, who often have to resort to inventive methods to understand closed systems. To help reduce the effort needed to get a foothold into a new system, we present GlitchKit–an open source hardware and firmware solution that significantly simplifies the process of fault-injecting your way into a new system–and of fault-injecting firmware secrets out! This...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, glitchkit
Patching – it’s complicated! As much as we like to point fingers of blame and malign the processes in place, the fact is that one size does not fit all when security updates get issued. What’s the definition of insanity: doing the same thing over and over. Organizations at every level seem to be struggling with staying on top of patching, but it feels more like a necessary evil rather than a best practice. We’re damned if we do and damned if we don’t. We need to go beyond just finding...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
The command line hexadecimal editor, disassembler and debugger radare2 can be an invaluable reverse engineering tool. Even users of IDA Pro can find use in radare2 when it comes to odd file formats and getting a second opinion from a different disassembly engine. The biggest barrier to easy adoption of radare2 is the funky command sequences it employs. What if we threw a chatbot on top of it, so folks could type in detailed questions about a binary and get reasonable answers? What if we put a...
Topics: Youtube, video, Science & Technology, radare2, shmoocon, shmoocon 2018, hacking
The elite hacker is a myth we’ve given power to because breaches continue to happen. A zero breach mentality does not work. Learn how an attacker actually thinks and how they always can turn your enterprise defense into swiss-cheese. It’s only kinda your fault because all those pretty products you bought are all failing you the same way. Bryson Bort (@brysonbort) is the Founder and CEO of SCYTHE and Chairman of GRIMM. Prior to launching SCYTHE and GRIMM, Bryson led an elite research &...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Subtitle: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency SSL Certificates and Certificate Authorities are the backbone of how secure communication works online for most secure protocols these days. This has worked well for quite some time, but fails when you can no longer trust the Certificate Authorities as we have seen when they are breached or misbehave. Certificate Transparency was created as a way to allow anyone to publicly audit the behavior...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, certgraph
Note: This video is evidently only the last 18 minutes or so of the talk - this is how Shmoocon uploaded it to the Internet Archive. Sorry for the inconvenience. With the rise in leaks of our personal information, most of us are well-educated about the dos and don’ts of protecting our personal data. However, we don’t always realize that the “innocuous” data that we allow companies to collect can still be used to gather valuable insight into our daily lives. I will discuss how I used...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, google
Subtitle: Listening in, gathering data and watching for less than $100 It’s 2018 and many people are still using unencrypted wireless communications in critical systems. We will review how to build a robust and open signals intelligence (SIGINT) platform. As a proof of concept we show the platform capturing publicly accessible radio bands and some basic analysis of that data. The talk will focus on how we demodulate, decode and analyze data across many chunks of the spectrum using a Raspberry...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, SIGINT
Many people have a plan to make it through the robopocalypse (robot apocalypse), but in this talk we put these plans to the test. We start our discussion with a quick overview of physical and social abilities of current robots, mainly as a way to inform the people that haven’t taken the time to think what their life might be like if robots were to take over. We follow this by doing live demos of robot physical and social engineering attacks, and some of the defenses that we have employed to...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, robopocalypse, robots
For many CSOCs, there was a simpler time. A time when their security event collection and monitoring problems could, in theory, be solved by buying, installing, and optimizing one product. Today, life is not so simple. The SIEM marketspace started with many startups, consolidated to a handful of leaders, and has diversified again. Acquiring and operating an analytic platform for large and mature CSOCs is a major investment of time, money and effort. The best approach to common...
Topics: Youtube, video, Science & Technology, shmoocon 2018, shmoocon, hacking, CSOC, SIEM
The Controller Area Network (CAN) bus has been mandated in all cars sold in the United States since 2008. But CAN is terrible in many unique and disturbing ways. CAN has served as a convenient punching bag for automotive security researches for a plethora of reasons, but all of the available analysis tools share a shortcoming. They invariably use a microcontroller with a built-in CAN peripheral that automatically takes care of the low-level (ISO layer 1 and 2) communication details, and ensures...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, CAN bus
Note: Audio is missing until the third minute in this video. This is from the source. Sorry for the inconvenience. As desktop and server security keeps raising the baseline for successful exploitation, IOT devices are still stuck in the 1990’s, despite their ubiquity in every home network. This, coupled with the trend of “monitor your devices from anywhere!”, is creating a time-bomb situation, in which millions of households are left vulnerable, regardless of any network security posture....
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, iot rce, disney
Subtitle: A Cipher in Arlington National Cemetery Elonka Dunin, known for her website on the World’s Most Famous Unsolved Codes, discovered a cipher on one of the tombstones in Arlington National Cemetery. Not just any tombstone, it’s that of William and Elizebeth Friedman, two giants in the fields of cryptanalysis. In fact, William Friedman created the terms of cryptanalysis, and also of “index of coincidence”. Elizebeth, who had taught William about cryptography in the first place,...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, friedman tombstone
6,020
6.0K
Jun 22, 2012
06/12
by
ShmooCon
movies
eye 6,020
favorite 8
comment 0
Becoming Jack Flack: Real Life Cloak & Dagger Taylor Banks and Adam Bregenzer Are you on too many social networking sites? Have all of your exes found you on facebook? If the fuzz came looking, how easy it would be for them to find you? kaos.theory, the creators of Anonym.OS, bring you this abridged guide to becoming (and staying) anonymous. Privacy is your right, anonymity is your path, and kaos.theory will be your guide. We address anonymity at three progressively comprehensive levels -...
Topics: hacking, convetion, shmoocon
796
796
Jun 26, 2012
06/12
by
ShmooCon
movies
eye 796
favorite 1
comment 0
21st Century Shellcode for Solaris - Tim Vidas Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to SPIKE Land - Enno Rey and Daniel Mende Backtrack Demo Baked not Fried Performing an Unauthorized Phishing Awareness Exercise - Syn Phishus Closing Remarks Forced Internet Condom - Aaron Higbee and Jaime Fuentes Forensic Image Analysis to Recover Passwords - David Smith Got Citrix Hack It! - Shanit Gupta Hacking Windows Vista Security - Dan Griffin Hacking the Samurai Spirit -...
Topics: hacker, conference, shmoocon
Subtitle: A Decade of Evasive Malware Attack and Defense In this presentation we take a look at over a decade of research into the cat-and-mouse game of evasive malware vs. automated malware analysis systems. While the challenge of evasive malware is well known, few have ever comprehensively looked at the problem. We survey almost two hundred scholarly works, industry presentations, and studies of malware in the wild over the past decade to understand how we got to where we are today, and where...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, malware
You’re arrested and your phone is held up to your face to be unlocked by the arresting officer, then sent to a forensics lab. Dystopian future or one where FaceID collides with weak self-incrimination protections for biometrics? This talk will explain how your 4th and 5th Amendment rights interact with advances in biometric technology. Along the way it will offer design suggestions for creators of mobile devices and tips to end users. Wendy Knox Everette (@wendyck) is a hacker lawyer who...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, civil rights
This talk is an encapsulation of implemented solutions for achieving common requirements when constructing software designed to perform long term covert intelligence gathering. It is a “grab bag” of “tips and tricks” developed and or abstracted from previous works by the presenter in a variety of intelligence gathering operations, none of which will be specifically disclosed. Full source code (almost all of it written in Golang) will be provided for tactic snippets, as well as several...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, vyrus, malware
With the demise of dtrace on macOS, and Apple’s push to rid the kernel of 3rd-party kexts, another option is needed to perform effective auditing on macOS. Lucky for us, OpenBSM fits the bill. Though quite powerful, this auditing mechanism is rather poorly documented and suffered from a variety of kernel vulnerabilities. In this talk, we’ll begin with an introductory overview of OpenBSM’s goals, capabilities, and components before going ‘behind-the-scenes’ to take a closer look at...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, openbsm, macos
JA3 is an open source SSL/TLS client fingerprinting tool developed by John Althouse, Josh Atkins, and Jeff Atkinson. Since it’s release a few months ago in a blog post, it has gained wide adoption across the industry and we’ve seen conference talks highlighting it’s features. However, there’s been some confusion on it’s capabilities and how best to utilize it. So, then, it’s about time we do a talk on JA3 and what it can really do. In this talk we will show the benefits of SSL...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, JA3, ssl
Higher education institutions have started heavily investing in cybersecurity education programs for STEM (Science, Technology, Engineering, and Mathematics) disciplines. These programs offer standard courses, such as network security, forensics, penetration testing, intrusion detection and recovery. To offer a holistic experience, these programs also include courses on business systems lifecycle, data analytics, auditing, investigation, and cyberlaw. Little, however, is being done to...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, cybersecurity education
Domain generation algorithm (DGA) malware makes callouts to unique web addresses to avoid detection by static rules engines. To counter this type of malware, we created an ensemble model that analyzes domains and evaluates if they were generated by a machine and thus potentially malicious. The ensemble consists of two deep learning models – a convolutional neural network and a long short-term memory network, both which were built using Keras and Tensorflow. These deep networks are flexible...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, malware detection
ShmooCon 2007 2007 Speakers Speaker Selection We promised to list our CFP selection commitee. This team reviewed a ton of quality papers. A true thanks goes out to these folks: 3ric, Bob Fleck, cazz, cowboym, freshman, gdead, Johnny Long, Ken Caruso (ipl31), Shmoo Manchu, w0mbat ------------------------------------------------------------------------------------------------- Keynote Speaker - Avi Rubin Bio Dr. Aviel D. Rubin is Professor of Computer Science and Technical Director of the...
Topics: shmoocon, hacker, conference, anarchivism
American Fuzzy Lop (AFL) revolutionized fuzzing. It’s easily the best thing out there for quickly performing cutting-edge automated vulnerability analysis on command line applications. But what about the situations where accessing the logic you want to fuzz via command line isn’t so simple? For example, maybe you want to fuzz a parsing function from an embedded system that receives input via an analog RF front-end. Sometimes you can write a test harness, but what if you could just emulate...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, afl-unicorn
Subtitle: Forensic Manipulation of Fitness App Data. Hard core athletes and wannabes alike use the Strava app to track their runs, bikes, swims, and more. Most athletes compete, nay, fight to the death for the top “leaderboard” spot on a given segment of a run. Want to be the fastest down the Mall? Want to outpace professional marathon runners in the Marine Corp Marathon? Without ever tying your shoe laces? Let me show you the hacker’s way up the leaderboard. By examining and manipulating...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, strava, fitness apps
Researching embedded devices is not always straightforward, as such devices often vastly differ from one another. Such research is difficult to repeat and results are not easily comparable because it is difficult to conceive a standard approach for analysis. This document proposes an initial research methodology for vulnerability analysis that can be applied to any embedded device. This methodology looks beyond preliminary research findings, such as open ports and running services, and takes a...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, embedded device, trommel
The information security community has long suffered from a lack of effective and affordable tools and techniques for locating radio devices. Many methods are available, but most of them require multiple radio receivers and/or physical motion of one or more antennas. Pseudo-doppler is an old technique that implements Direction Finding (DF) by rapidly switching between multiple fixed antennas connected to a single radio receiver. We have taken a modern approach to the implementation of...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, pseudo-doppler, SDR
Subtitle: Using Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions The FCC is trying to ram through anti-net neutrality legislation and are using the submissions from their call for comments. There were more than 22 million comments submitted in approximately three months dealing with net neutrality, many supporting an anti-net neutrality stance, but something is rotten in the state of the US. Other researchers have posited that there are bots and false submissions, but...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, net neutrality,...
4,921
4.9K
Jun 24, 2012
06/12
by
ShmooCon
texts
eye 4,921
favorite 8
comment 1
Becoming Jack Flack: Real Life Cloak & Dagger Taylor Banks and Adam Bregenzer Are you on too many social networking sites? Have all of your exes found you on facebook? If the fuzz came looking, how easy it would be for them to find you? kaos.theory, the creators of Anonym.OS, bring you this abridged guide to becoming (and staying) anonymous. Privacy is your right, anonymity is your path, and kaos.theory will be your guide. We address anonymity at three progressively comprehensive levels -...
favorite ( 1 reviews )
Topics: shmoocon, hacker, conference, anarchivism