Monthly Archives: May 2013

Introduction to GNU Radio – Tempest Void

Introduction to GNU Radio

A primer on GNU Radio and SDR (Software Defined Radio) in general. What it is and how to go about using it. Hands-on workshops to follow.

Tempest Void

Electrical engineer, freelance consultant, often working on spiffy projects that don’t exist.

Stupid whitehat tricks – Robert

Stupid whitehat tricks

This talk will be a light hearted look back at some amusing hacks from my past.

Robert

Focused on computer forensics and information security defense. Earlier this year I moved back to Chicago to take a senior position on the security team of a US fortune 500 company. For the previous six years I lived and worked in Germany as a member of a computer emergency response team for a US government contractor. I split my time between working, hacking on technology, attending hacker conferences, and traveling the world. The best time are when I get to combine all four at once.

Electronic Privacy in the Era of Big Data – Big Brother *is* Watching – Pat

Electronic Privacy in the Era of Big Data – Big Brother *is* Watching

As we’ve seen recently in the Petreus matter, what you put out there (and even things you don’t actually _put_ out there) can come back to bite you. This talk will give a brief overview of the legislative whack-a-mole efforts that are the ongoing attempt to extend privacy rights into the electronic realm.

Pat

Pat Wilson retired from a career in computer sysadmin and security and has spent the last 4 years bashing her head into the rock of law school. She will sit for the California Bar in February, after which she’ll have to find a job.

WorldToor Forum – nfiltr8

WorldToor Forum

The WorldToor Forum will be held to discuss future WorldToor Events, activities, and ways we can get more participate.

nfiltr8

I’m the Vice-Chairman of ToorCon and have been with the organization since 1999. My main role at ToorCon is operations. I’d like to consider myself a 1337 organizer of hax0r events, but in reality I’m just a nerdy caterer with a spreadsheet. My day job is the Director of Product Development at UNIXSurplus, Inc.

FPGA Crypto Tricks – h1kari

FPGA Crypto Tricks

This talk will cover some interesting tricks for cracking different lesser-known but massively deployed ciphers with FPGAs along with a real world demonstration of the implications of what happens when some ciphers are broken.

h1kari

David Hulton is the co-founder and chairman of the ToorCon group of events (ToorCon San Diego, ToorCon Seattle, ToorCamp, and WorldToor). He’s also the co-founder and Director Security Applications at Pico Computing where he dedicates most of his time to breaking codes with the custom Field Programmable Gate Array (FPGA) systems that his company develops. He’s mostly known for attack research he’s published on 802.11, GSM, smart cards, automobiles, and many other widely deployed systems. He’s also the co-owner of Ada’s Technical Books — a carefully curated paradise for geeks, with his wonderful wife.

KISS: A Bit Too Simple – Greg

KISS: A Bit Too Simple

KISS (`Keep it Simple Stupid’) is an efficient pseudo-random number generator specified by G. Marsaglia and A. Zaman in 1993. G. Marsaglia in 1998 posted a C version to various USENET newsgroups, including \texttt{sci.crypt}. Marsaglia himself has never claimed cryptographic security for the KISS generator, but many others have made the intellectual leap and claimed that it is of cryptographic quality. In this paper we show a number of reasons why the generator does not meet the KISS authors’ claims, why it is not suitable for use as a stream cipher, and that it is not cryptographically secure. Our best attack requires about 70 words of generated output and a few hours of computation to recover the initial state.

Greg

Greg Rose is a Senior VP in the office of the Chief Scientist for QUALCOMM Incorporated, where he works on cryptographic security and authentication for third-generation mobile phones and other technologies and manages other diverse groups. He holds a number of patents for cryptographic methods and has successfully cryptanalyzed widely deployed ciphers. Greg was program chair of the 1996 and 2000 USENIX Security Symposia, and General Chair of Crypto 2003. Some of his papers and free software are available atย http://www.seer-grog.net

Sparkle Party – fNaCK

Sparkle Party

ย You’re invited.

fNaCK

Geek specializing in offensive computing products and dense IP network design. People that have paid me $ for grey matter rental include Fortune 10, DoD, casinos, and the bar down the street. Currently learning about and trying not embarrass myself too much in software defined radios and RF exploitation.

Trekking in the Kingdom of Mustang – David

Trekking in the Kingdom of Mustang

May of this year I spent 3 weeks on a rarely available, traditional Himalayan camping trek to the “Mustang,the Last Forbidden Kingdom.” There is no road (yet) through Upper Mustang, a special-permit area of Nepal. It is a 5 day trek to get to the capital city, pop. 800. This Tibetian Kingdom is stunningly beautiful, culturally rich, and provides a extraordinary backdrop for introspection.

David

Undergrad in the arts at Ripon College, Wisconsin. Have owned several retail businesses in San Diego, from Hardwood and woodworking supply to art galleries. Presently owner of David Alan Collection in Solana Beach, Ca. It’s worth a peep at the website:ย www.thedavidalancollection.comย (blog and villa avail on home page.) I spend about half of each year in the Far East collecting art and antiques throughout Asia, from Bali, Indoneasia, Japan, Thailand and China for David Alan Collection, as well as designing and making one-of-a-kind furniture and art pieces. Amita and I live in the San Diego area and travel extensively together and well as working on our own international projects.

Believe In Film – Colby

Believe In Film

Why shoot film in the age of digital?

Colby

I’m involved with IT outsourcing at a Seattle area employer over the years and during my down time, I turn to photography as my comfort zone.