按 Enter 到主內容區
:::

TWCERT/CC台灣電腦網路危機處理暨協調中心

:::

DEF CON 27

發布日期:
字型大小:
  • 發布單位:TWCERT/CC
  • 更新日期:108-07-16
  • 點閱次數:38
DEF CON 27DEF CON 27
標題 DEF CON 27
活動類型 研討會
費用 付費
活動日期 108-08-08
地址定位 Las Vegas, NV 89109, US

時間:2019/08/08~08/11

地點:Paris Las Vegas

線上報名連結:https://www.defcon.org/

 

  • The DEF CON 27 Theme: 'Technology's Promise'

DEF CON 26 was about the inflection point between disorder and dystopia - the moment before the point of no return. The DEF CON 27 theme, in a way, responds to '1983' with new questions. What does it look like when we make the better choice? What kind of world do we hack together in the sunniest timeline? How does our real best-case scenario compare to the future we've been dreaming of for generations? 

Extra consideration will be granted for submissions that tie into this year's theme. We want you to hear about your hacks and research, and how will it relate to the discussions below.

 

  1. Cypherpunk and "engineering out of the problem".

Tim May was once quoted saying anonymity online would "alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret." At the time his manifesto was for "both a social and economic revolution" and so began the newly formed "Cypherpunks". Cypherpunks invented cryptography with the aim of abolishing big brother, but 30 years later we have big corporations in their place. Large corporations have insured that the 21st century hasn't come without compromises.

Crypto-anarchism is still alive and well today in well known examples like Tor, Freenet, cryptocurrencies, etc. Tell us what you're doing now to circumvent the future we're living in? Corporations are developing advanced facial recognition and becoming "the new big brother". Social media is exchanging a false sense of freedom at the expense of a total removal of anonymity. The Cypherpunk ethos will have to adapt now that we have merged the "instagram-able" life, biometrics, ML, IOT, and micro-targeting. To build a future that doesn't limit our love of modern technology and socialization at the expense of freedom will require decentralization and anonymity technology breakthroughs. What are you doing to engineer your way out of these problems?

 

  1. "Keep InfoSec out of Hacking"

DEF CON wants to support the culture of hacking. Between the TV interviews and the assessments we are still the same people with funny names threading the eye of the needle to make the next breakthrough. Hackers have become mainstream, seemingly to leave the underground to make a "legitimate" living. The industry has developed policies for ethical hacking, multimillion dollar pentesting orgs, bug bounty programs, and set the foundations of security for behemoth corporations. Being paid for hacking was the dream, but now it is an industry unto itself that focuses predominantly on enterprise. 

DEF CON is a hacker con, not an InfoSec conference. Hackers are more focused on the joy of discovery, irreverence, novel if impractical approaches. InfoSec is more focused on enterprise, frameworks, and protecting the interests of share holders. There is great value in both types of content, but our con is a hacker con by design. 

Activities that enable the hacker mindset and demonstrate how to master a certain technique are always going to be selected over a great enterprise InfoSec talk. DEF CON has always tried to provide a way to amplify the work of hackers, to create a venue for research that allows for others to grow. The idea that technology should be free was written into the subtext of "The Hacker Manifesto" and is just as valid today as it was 33 years ago.

 

  1. We want the computer from Star Trek, what we're getting is HAL 9000.

At DEF CON 24 we hosted DARPA's Grand Cyber Challenge, a challenge to the innovation community with a $2M prize to build a computer that can hack and patch software with no one at the keyboard. This was a lot of fun, and yet there were whispers among us of a future where artificial intelligence will render some human jobs irrelevant. We can see ourselves approaching an event horizon of automation. This technology is not without a price, but how do we get to the utopian world where we ask a computer to make us a cup of earl grey without landing ourselves in a black mirror dystopia? Engineers are developing smart home devices with disembodied voices, while hackers are quick to shout tropes of "NSA listening devices". Is the reckless misuse of technology leading us to a dark future? What can hackers do to help achieve the sunniest timeline?
Above are some suggested topics that loosely align with the theme, we consider all talk subjects. If your talk doesn't fit in one of these topics don't worry, the suggested themes are just a starting point. We've dozens of speaking slots, the tracks will be filled with a clustering of subjects; hardware hacking, lock picking, mobile hacking, reverse engineering, legalities of hacking, and more.

回頁首