Media Summary: The Brave Browser is safer & much faster, based on Chrome. Earn crypto while your browse: Speaker: Roger Dingledine Many of you have probably tried Tor, and then stopped because you found it too slow. Now that Tor ... Speaker: Jason Scott Textfiles.com In a world where scams are now considered as commonplace as functioning websites and cell ...

Defcon 17 Something About Network - Detailed Analysis & Overview

The Brave Browser is safer & much faster, based on Chrome. Earn crypto while your browse: Speaker: Roger Dingledine Many of you have probably tried Tor, and then stopped because you found it too slow. Now that Tor ... Speaker: Jason Scott Textfiles.com In a world where scams are now considered as commonplace as functioning websites and cell ... Speakers: Michael Ligh Malicious Code Analyst, iDefense Matthew Richard Malicious Code Operations Lead, Raytheon ... Speaker: Luiz "effffn" Eduardo Although inflight wee-fee service is really nothing new... (some airlines have had it for a while, ... "I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" (Dispelling the Myths and Discussing the Facts of ...

Talk delivered by Chema Alonso and Jose Palazon Palako at Speakers: HighWiz, The Dark Tangent, Russr, DJ Jackalope, Deviant Ollam, Thorn, ThePrez98, LosT, Noid, Siviak What is ... Social Zombies: Your Friends Want to Eat Your Brains Tom Eston Social Media Security Researcher Kevin Johnson Senior ... Speakers: Valsmith Attack Research, LCC, CEO Colin Ames Security Researcher David Kerb Security Researcher Attackers have ... Speakers: Dmitri Alperovitch VP Threat Research, McAfee Marcus Sachs Director, SANS Internet Storm Center Phyllis Schneck ... Speaker: Digividual This talk will present a survey of the most popular cloud/web applications and their responses to a questioner ...

Speaker: Mark Ryan Del Moral Talabis Senior Consultant, Secure-DNA Consulting It is not a secret that in today's world, ... Speaker: James "Myrcurial" Arlen Security Researcher Tiffany Rad President of ELCnetworks, LLC. and Adjunct Professor at ... Speaker: Rod Beckstrom Beckstrom's Law is a new model or theorem of economics formulated by Rod Beckstrom. It purports to ...

Photo Gallery

DEFCON 17: Something about Network Security
DEFCON 17: Why Tor is Slow, and What We're Doing About It
DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars
DEFCON 17: Making Fun of Your Malware
DEFCON 17:  30k Feet Look at WiFi
DEF CON 17 - Jayson E Street - Dispelling the Myths and Discussing the Facts of Global Cyber Warfare
DEFCON 17 - Tactical Fingerprinting Using Metadata Hidden Info and Lost Data  with FOCA
DEFCON 17:  Multi Touch Network Monitor
DEFCON 17: Panel: DEF CON 101
DEF CON 17 - Tom Eston and Kevin Johnson - Social Zombies Your Friends want to Eat Your Brains
DEFCON 17: MetaPhish
DEFCON 17: Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
View Detailed Profile
DEFCON 17: Something about Network Security

DEFCON 17: Something about Network Security

The Brave Browser is safer & much faster, based on Chrome. Earn crypto while your browse: https://brave.com/hac463.

DEFCON 17: Why Tor is Slow, and What We're Doing About It

DEFCON 17: Why Tor is Slow, and What We're Doing About It

Speaker: Roger Dingledine Many of you have probably tried Tor, and then stopped because you found it too slow. Now that Tor ...

DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars

DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars

Speaker: Jason Scott Textfiles.com In a world where scams are now considered as commonplace as functioning websites and cell ...

DEFCON 17: Making Fun of Your Malware

DEFCON 17: Making Fun of Your Malware

Speakers: Michael Ligh Malicious Code Analyst, iDefense Matthew Richard Malicious Code Operations Lead, Raytheon ...

DEFCON 17:  30k Feet Look at WiFi

DEFCON 17: 30k Feet Look at WiFi

Speaker: Luiz "effffn" Eduardo Although inflight wee-fee service is really nothing new... (some airlines have had it for a while, ...

DEF CON 17 - Jayson E Street - Dispelling the Myths and Discussing the Facts of Global Cyber Warfare

DEF CON 17 - Jayson E Street - Dispelling the Myths and Discussing the Facts of Global Cyber Warfare

"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" (Dispelling the Myths and Discussing the Facts of ...

DEFCON 17 - Tactical Fingerprinting Using Metadata Hidden Info and Lost Data  with FOCA

DEFCON 17 - Tactical Fingerprinting Using Metadata Hidden Info and Lost Data with FOCA

Talk delivered by Chema Alonso and Jose Palazon Palako at

DEFCON 17:  Multi Touch Network Monitor

DEFCON 17: Multi Touch Network Monitor

The Brave Browser is safer & much faster, based on Chrome. Earn crypto while your browse: https://brave.com/hac463.

DEFCON 17: Panel: DEF CON 101

DEFCON 17: Panel: DEF CON 101

Speakers: HighWiz, The Dark Tangent, Russr, DJ Jackalope, Deviant Ollam, Thorn, ThePrez98, LosT, Noid, Siviak What is ...

DEF CON 17 - Tom Eston and Kevin Johnson - Social Zombies Your Friends want to Eat Your Brains

DEF CON 17 - Tom Eston and Kevin Johnson - Social Zombies Your Friends want to Eat Your Brains

Social Zombies: Your Friends Want to Eat Your Brains Tom Eston Social Media Security Researcher Kevin Johnson Senior ...

DEFCON 17: MetaPhish

DEFCON 17: MetaPhish

Speakers: Valsmith Attack Research, LCC, CEO Colin Ames Security Researcher David Kerb Security Researcher Attackers have ...

DEFCON 17: Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World

DEFCON 17: Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World

Speakers: Dmitri Alperovitch VP Threat Research, McAfee Marcus Sachs Director, SANS Internet Storm Center Phyllis Schneck ...

DEFCON 17: Socially Owned in the Cloud

DEFCON 17: Socially Owned in the Cloud

Speaker: Digividual This talk will present a survey of the most popular cloud/web applications and their responses to a questioner ...

DEFCON 17: Dangerous Minds: The Art of Guerrilla Data Mining

DEFCON 17: Dangerous Minds: The Art of Guerrilla Data Mining

Speaker: Mark Ryan Del Moral Talabis Senior Consultant, Secure-DNA Consulting It is not a secret that in today's world, ...

DEFCON 17: Your Mind: Legal Status, Rights and Securing Yourself

DEFCON 17: Your Mind: Legal Status, Rights and Securing Yourself

Speaker: James "Myrcurial" Arlen Security Researcher Tiffany Rad President of ELCnetworks, LLC. and Adjunct Professor at ...

DEFCON 17: Attacking Tor and the Application Layer

DEFCON 17: Attacking Tor and the Application Layer

The Brave Browser is safer & much faster, based on Chrome. Earn crypto while your browse: https://brave.com/hac463.

DEFCON 17: Beckstrom's Law - A Model for Valuing Networks and Security

DEFCON 17: Beckstrom's Law - A Model for Valuing Networks and Security

Speaker: Rod Beckstrom Beckstrom's Law is a new model or theorem of economics formulated by Rod Beckstrom. It purports to ...