Mitigating Con Deprivation: Disobey 2020

While the Coronavirus-induced lockdown surely makes life easier for the socially anxious and awkward ones among us, it also takes away the one thing that provides a feeling of belonging and home: conferences. Luckily, there are plenty of videos of past events available online, helping to bypass the time until we can mingle among like-minded folks again. To put one additional option on the list, one event you probably never even heard of is Disobey, Finland’s annual security conference that took place for its fifth time in Helsinki earlier this year, and they recently published the playlist of this year’s talks on their YouTube channel.

With slightly under 1500 hackers, makers, and generally curious people attending this year, Disobey is still on the smaller side of conferences, but comes with everything you’d expect: talks, workshops, CTF challenges, and a puzzle-ridden badge. Labeling itself as “The Nordic Security Event”, its main focus is indeed on computer and network security, and most of the talks are presented by professional security researchers, oftentimes Red Teamers, telling about some of their real-world work.

In general, every talk that teaches something new, discusses important matters, or simply provides food for thought and new insight is worth watching, but we also don’t want to give everything away here either. The conference’s program page offers some outline of all the talks if you want to check some more information up front. But still, we can’t just mention a random conference and not give at least some examples with few details on what to expect from it either, so let’s do that.

Continue reading “Mitigating Con Deprivation: Disobey 2020”

My Career As A Spammer, And Other Stories From The Sneakernet

A large hacker camp is in microcosm a city, it has all the services you might expect to find in a larger settlement in the wider world. There is a telecommunication system, shops, bars, a health centre, waste disposal services, a power grid, and at some camps, a postal system. At Electromagnetic Field, the postal system was provided by the Sneakernet, a select group of volunteers including your Hackaday scribe under the direction of the postmaster Julius ter Pelkwijk. I even had the fun of delivering some chopped pork and ham. (More on that later.) Continue reading “My Career As A Spammer, And Other Stories From The Sneakernet”

Computers Go Hollywood

Have you ever been watching a TV show or a movie and spotted a familiar computer? [James Carter] did and he created a website to help you identify which old computers appear in TV shows and movies. We came across this when researching another post about an old computer and wondered if it was any old movies. It wasn’t.

You can search by computer or by title. There are also ratings about how visible, realistic, and important the computer is for each item. The database only contains fictional works, not commercials or documentaries. The oldest entry we could find was 1950’s Destination Moon which starred a GE Differential Analyzer. Well, also John Archer, we suppose. We assume GE had a good agent as the same computer showed up in Earth vs. the Flying Saucers (1956) and When Worlds Collide (1951). You can see a clip of the computer’s appearance in Earth vs. the Flying Saucers, below.

Continue reading “Computers Go Hollywood”

The PDP-1: The Machine That Started Hacker Culture

One of my bucket list destinations is the Computer History Museum in Mountain View, California — I know, I aim high. I’d be chagrined to realize that my life has spanned a fair fraction of the Information Age, but I think I’d get a kick out of seeing the old machines, some of which I’ve actually laid hands on. But the machines I’d most like to see are the ones that predate me, and the ones that contributed to the birth of the hacker culture in which I and a lot of Hackaday regulars came of age.

If you were to trace hacker culture back to its beginning, chances are pretty good that the machine you’d find at the root of it all is the Digital Equipment Corporation’s PDP-1. That’s a tall claim for a machine that was introduced in 1959 and only sold 53 units, compared to contemporary offerings from IBM that sold tens of thousands of units. And it’s true that the leading edge of the explosion of digital computing in the late 50s and early 60s was mainly occupied by “big iron” machines, and that mainframes did a lot to establish the foundations for all the advances that were to come.

Continue reading “The PDP-1: The Machine That Started Hacker Culture”