KEYNOTE The History of Video Game Console Hacking Dan Loosen CypherCon 2017

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=-hGtzFsXzWc



Duration: 53:32
3 views
0


CypherCon - 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CypherCon
CypherCon is Wisconsin’s largest annual hacker conference based in Milwaukee, Wisconsin. Topics include Hacking, Information Security, Privacy, Cryptography, Forensics, and other Security oriented topics.
The event aims to lead, convene, and connect local and neighboring hacker and information security friends for an open discussion on strong cryptography, become advocacy outlet for privacy, and strive for the betterment of education of the general public in a diligent, loyal, honest manner, and not knowingly be part of any illegal or improper activities. We will accomplish this by being the interchange of knowledge and ideas, advancing the industry forward, while never forgetting our cultural hacker past.

Years 1-5 has been about immediacy & living in the moment.

Years 6-10 is about chooses one can make in life.
The conference format allows for specialized areas called villages, interesting talks, informal discussions, socializing, challenges, contests, and competitions. Technology and hacking is the primary purpose of the con but recommend divination into other related topics. Some like hacking the badge, some like capture the flag, some like the presentation topics.




Other Videos By All Hacking Cons


2022-04-09TrackingMonitoring WiFi devices without being connected to any network Caleb Madriga CypherCon 2
2022-04-09Threat Intelligence 101 Basics without Buzzwords M4ninBl4ck CypherCon 2017
2022-04-09The Upside Down Going from NetSec to AppSec Cody Florek CypherCon 2017
2022-04-09Protecting Passwords with Oblivious Cryptography Adam Everspaugh CypherCon 2017
2022-04-09Forensic Deconstruction of Databases through Direct Storage Carving Dr Alexander Ras CypherCon 2
2022-04-09Explore Wisconsin Hacker History Brad Swanson CypherCon 2017
2022-04-09Hacking, Phreaking & Juvenile Delinquency Joe Grand CypherCon 2018
2022-04-09Predictive Analytics and Machine Learning Real Use Cases for ITSecurity Professional CypherCon 2
2022-04-09No Post 104 Modern Evasion Techniques Jason Lang CypherCon 2017
2022-04-09Naked and Vulnerable A Cybersecurity Starter Kit Shannon Fritz CypherCon 2017
2022-04-09KEYNOTE The History of Video Game Console Hacking Dan Loosen CypherCon 2017
2022-04-09KEYNOTE STEHM is the new STEM David Heal Schwartzberg CypherCon 2017
2022-04-09JavasCrypto How we are using browsers as Cryptographic Engines Kat Traxler CypherCon 2017
2022-04-09Espionage Soviet MiGs Dave Roebke CypherCon 2017
2022-04-09Does DoD Level Security Work in the Real World Jeff Man CypherCon 2017
2022-04-09Cluster Cracking Passwords MDXfind Robert Reif CypherCon 2017
2022-04-09Closing Ceremony Organizors CypherCon 2017
2022-04-09Can Cryptography Frustrate Fascism Phillip Rogaway CypherCon 2017
2022-04-09Brain Based Authentication Melanie Segado Sydney Swaine Simon CypherCon 2017
2022-04-09Beyond the Fringe Anomalies of Consciousness Experience and Scientific Research Rich CypherCon 2
2022-04-09Badges CypherCon 2017



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering