There’s many great workshops going on at ToorCamp this year, but most have limited attendance. To reserve your spot in a workshop, make sure to register for it ahead of time! Most workshops are free but some require a fee to help cover materials so make sure to paypal your instructor with the fee to confirm your reservation. For workshops that don’t sell out we’ll also be processing sign-ups at the info desk at the camp, but it’s highly encouraged to sign up ahead of time.
In case you haven’t made up your mind on whether or not to come to ToorCamp, we want to help you make your decision. Here’s some articles about the last event to check out!
“Welcome to ToorCamp, a five-day retreat where some of America’s most elite hackers, technologists and DIY deviants escape civilization in order to rebuild it from scratch, leapfrogging the pedestrian present directly into a postapocalyptic science fiction future.”
“filled with a sense of disbelief that it’s over, a giddy excitement as I scheme ways to apply what I’ve learned, and the definite intention to be first ticket holder on the list for next year’s ToorCamp event.”
Ada’s Technical Books & Cafe in the Capitol Hill neighborhood of Seattle is now selling ToorCamp tickets! Buy your ticket in person with a Credit Card, Cash, Check, or even Bitcoin and get a free beverage with your purchase. Tickets are $240 until June 30th so hurry up and get your ticket before time runs out!
Looking through the press from the last ToorCamp, I stumbled across the amazing geekwire posts that Amal Graafstra posted last time. Check them out!
ToorCamp Journal: Pushing the boundaries of technology
ToorCamp Journal, Day 1: Let the hacking begin
ToorCamp Journal, Day 2: The altar of geekdom
ToorCamp Journal, Day 3: Finally, the Implantation Station
ToorCamp CFP is now up. If your interested in sharing your ideas please sign up to give a talk or workshop. SIGNUP!
Our reception tonight is at the pool deck on the 3rd Floor. Follow the signs for the Ivory Room. Saturday and Sunday’s events will be on the Second Floor. You’ll need to use the elevators to get up. We’ll see you all soon!
Schools don’t teach hacking, and the internet hides it for both profit, and fear of punishment. This makes learning, in a legal way, very difficult; so we developed a site where anyone can create any security related challenge they want. This talk is about how we keep our server safe and secure while letting our users make any mistake they want so they can teach the world about all the web based exploits.
I love to break things and love to learn. I graduated from the University of Washington with a bachelors in Informatics. I have experience working in IT, and am currently employed at Security Innovation as a Security Engineer.
It’s been thirty years since Ken Thompson’s famous “Reflections on Trusting Trust” (well, 29, but what’s an off-by-one?). Back then, few hackers expected to actually encounter a planted bug, and now we speculate what commonly used software might not have them. But, if we somehow managed to eliminate all bugs, could we then trust software? We believe that the answer is “not really”: bugs are a part of the problem but by far not all of it.
Any complex enough input is indistinguishable from bytecode for a “weird” virtual machine hiding in the parser. Unless we radically redesign data formats, telling what data could do when fed to software is much harder than it needs to be. For code, of course, it’s known to be undecidable, but it may surprise you how many “tables” are as good as code: for example, so are ELF relocations + dynamic symbols, and so are IDT+GDT+TSS for an ia32 processor (no instructions needed for a Turing-complete computation). This talk will summarize two years of our explorations with @BxSays and @JulianBangert of such “weird machine” programming environments, and what these weird machines mean for “Trusting Trust” beyond bugs.
Sergey Bratus believes that hacking has become a distinct computing research and engineering discipline: while academia focuses on abstractions, models, and frameworks, hackers expose “weird machines” inside actual systems, and show how much unexpected computation power they are capable of. On his day job as a Research Assistant Professor at Dartmouth College, he is extremely fortunate to work with brilliant students who hack ELF, DWARF, 802.11, 802.15.4, and many other nice things.