Defcon 19 Call for Workshops

defcon

The crew at Defcon is hard at work getting things ready for this year’s event, taking place over the first weekend in August. While the typical call for papers has been out for almost two months now, the extra space afforded by the RIO hotel has given the organizers a chance to shake things up a bit and try something new.

Along side the call for papers, they have issued a call for workshops. Since they have about 8 spare rooms on hand, they have decided to allow people who consider themselves a leader, ‘leet hacker, or ninja in their particular field to share their knowledge in a small (30 person) workshop setting.

The organizers are not strict on content, though it should be compelling. They cite examples such as teaching people to build an impenetrable Linux installation, PS3 hacking, or even helping people prep for a Ham radio license exam.

If you have something interesting to share with the community, be sure to swing by the Defcon site and get your application started!

Comments

  1. 0x4368726973 says:

    Sounds like a good place for a VE session…

  2. Luke says:

    @0x4368726973 With the exception of last year (scheduled but no VEs showed up) there has been a VE session at DEFCON for the last 3-4 years. Great idea though.

  3. Spikerbond says:

    I think the link is broken, I keep getting a “problem loading page” error when I click on it.

  4. Mike Nathan says:

    @Spikerbond

    It’s not that the link is necessarily bad, the site is flaky on and off. It was giving me issues yesterday when I was putting this post together. I suppose I would recommend trying again in a little while.

  5. 0x4368726973 says:

    @Luke
    I wasn’t aware of that, unfortunately, I’ve not had the pleasure of making it to Defcon yet. If I am able to attend, and the session is an ARRL session, I’d be pleased to serve as an Extra VE. (I’m only accredited by the ARRL)

  6. Gert says:

    An impenetrable Linux installation.

    With network capabilities?

    I want to make an no-network.
    Fully encrypted system without any vulnerabilities such as cold boot attack. Basically a vault to view/copy and extract data. No malware what-so-ever. No special programs.
    And the list goes on but if anyone can help me out on some does and dont’s software please leave some links.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 92,050 other followers