Eric Escobar

Eric Escobar

Wireless Hacking & Capture The Flag

Eric Escobar will be presenting on wireless hacking concepts and will go into details on the CypherCon 2.0 wireless capture the flag!


Caleb Madrigal

Caleb Madrigal

Tracking/Monitoring WiFi devices without being connected to any network

A surprising amount of information can be intercepted by listening to raw WiFi signals. WiFi devices are continuously broadcasting information that can be use to track people’s movements and even to infer things like when security cameras have detected motion. And this data can be intercepted from blocks away, without even being connected to any WiFi network.

Come learn about some of the techniques that are almost certainly already being used by governments and corporations to track us all, and what can be done to help prevent it.


Zapp

Zapp

From zero to Bender in 12 months, how a software guy turned hardware

In this talk Zapp will walk you through how he went from barely knowing how to solder to building 175 electronic badges for DEF CON. He will detail the steps he took including projects he used to learn just enough to design, code, and produce the badges as well as share many of the screw-ups along the way. Finally, he will share a preview of the group’s DEF CON 25 badge.


Zapp & Toymakers

Zapp & Toymakers Mr. Blinky Bling  (Charles Lehman & Ben Hibben) + Mini

Mr. Blinky Bling (Charles Lehman & Ben Hibben) + Mini

Hackable Electronic Badge Panel

Hacker Conference Electronic Badge Panelists


Melanie Segado

Melanie Segado Sydney Swaine-Simon

Sydney Swaine-Simon

Brain Based Authentication

Brain based authentication is an emerging field that seeks to use brain signals as a form of biometric authentication. Due to the increased availability and decreased cost of portable electroencephalography (EEG) devices, which can record brain activity from the scalp surface, this technique has gained popularity in research and in the media. In this talk we will explain the science underlying brain based authentication, the advantages and limitations of this technique, and give a live demo of a brain based authentication prototype.