HOPE Number 9

The DVDs from HOPE Number Nine are now available! There are no region restrictions or DRM of any sort, so you're free to make copies and spread these around to preserve the history.

Your purchases here help to support these efforts and make our archiving projects possible. At $5 a disc, this isn't a bad deal by any stretch of the imagination. And if you buy the entire set (scroll to the bottom), you get a really amazing price. We also have 128 kbps audio available of every talk on a special two-disc DVD set for those who have want an audio record of the entire conference or who have no interest in seeing what people look like.

To order, just click the button(s) next to the passports. Click on the titles for descriptions of the talks and panels.


3D Printing: Making Friends in DC Before People Start Freaking Out
3D Printing: Making Friends in DC Before People Start Freaking Out

HN9A23$5.00
Activist DDoS Attacks: When Analogies and Metaphors Fail
Activist DDoS Attacks: When Analogies and Metaphors Fail

HN9A24$5.00
Advanced Handcuff Hacking
Advanced Handcuff Hacking

HN9B07$5.00
Advancements in Botnet Attacks and Malware Distribution
Advancements in Botnet Attacks and Malware Distribution

HN9C14$5.00
An Aesthetic Critique of Fictional Media
An Aesthetic Critique of Fictional Media

HN9C16$5.00
Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape
Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape

HN9B31$5.00
The ARRIStocrats: Cable Modem Lulz
The ARRIStocrats: Cable Modem Lulz

HN9B22$5.00
The Autism Spectrum and You
The Autism Spectrum and You

HN9A03$5.00
Brain Chemistry: How Psychoactive Chemicals Hack the Central Nervous System
Brain Chemistry: How Psychoactive Chemicals Hack the Central Nervous System

HN9B26$5.00
Building Radios to Talk to the Dead
Building Radios to Talk to the Dead

HN9C05$5.00
Cell Site Location Data and Nontrespassory Surveillance after U.S. v. Jones
Cell Site Location Data and Nontrespassory Surveillance after U.S. v. Jones

HN9A31$5.00
Closing Ceremonies
Closing Ceremonies

HN9A35$5.00
Combat Robots Then and Now
Combat Robots Then and Now

HN9B18$5.00
Community Fabrication: Four Years Later
Community Fabrication: Four Years Later

HN9A01$5.00
Computer Forensics: Possibility, Probability, Opinion, and Fact
Computer Forensics: Possibility, Probability, Opinion, and Fact

HN9B12$5.00
Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance
Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance

HN9B24$5.00
Crimeware Tools and Techniques of 2012: Past, Present, and Future
Crimeware Tools and Techniques of 2012: Past, Present, and Future

HN9C03$5.00
Cryptome Tracks the NYPD Ring of Steel
Cryptome Tracks the NYPD Ring of Steel

HN9A04$5.00
DARPA Funding for Hackers, Hackerspaces, and Education: A Good Thing?
DARPA Funding for Hackers, Hackerspaces, and Education: A Good Thing?

HN9A30$5.00
Dead in a Pool of Blood and Millions of Dollars of Net Art
Dead in a Pool of Blood and Millions of Dollars of Net Art

HN9B28$5.00
Declassifying Government and Undermining a Culture of Insecurity
Declassifying Government and Undermining a Culture of Insecurity

HN9C31$5.00
Designing Free Hardware: Scratching Your Own Itch with a Soldering Iron
Designing Free Hardware: Scratching Your Own Itch with a Soldering Iron

HN9B21$5.00
Destroying Evidence Before It's Evidence
Destroying Evidence Before It's Evidence

HN9B06$5.00
Digital Security in Health Care Institutions
Digital Security in Health Care Institutions

HN9C08$5.00
DKIM: You're Doing It Wrong
DKIM: You're Doing It Wrong

HN9C23$5.00
DUI/DWI Testing - A Hacker's View of the Technology and Process Behind the BAC and Standard Field Sobriety Test
DUI/DWI Testing - A Hacker's View of the Technology and Process Behind the BAC and Standard Field Sobriety Test

HN9A28$5.00
Electric Bodies and Possible Worlds
Electric Bodies and Possible Worlds

HN9B17$5.00
The Emergence of Hacker as Artist and Artist as Hacker
The Emergence of Hacker as Artist and Artist as Hacker

HN9C24$5.00
Exploiting ZigBee and the Internet of Things
Exploiting ZigBee and the Internet of Things

HN9B09$5.00
Explosive Steganography
Explosive Steganography

HN9A32$5.00
Geeks and Depression
Geeks and Depression

HN9B16$5.00
Hackers and Media Hype or Big Hacks That Never Really Happened
Hackers and Media Hype or Big Hacks That Never Really Happened

HN9B25$5.00
Hacking Mindsets: Conceptual Approaches to Transmission Art, Improvisation, Circuitbending, and Gaming Technology
Hacking Mindsets: Conceptual Approaches to Transmission Art, Improvisation, Circuitbending, and Gaming Technology

HN9C15$5.00
Hacking the Cosmos via Crowdsourced Particle Astronomy
Hacking the Cosmos via Crowdsourced Particle Astronomy

HN9C21$5.00
Hacking the Spaces
Hacking the Spaces

HN9B27$5.00
Hack the Law
Hack the Law

HN9C28$5.00
Hacktivism, Tools, and the Arab Spring
Hacktivism, Tools, and the Arab Spring

HN9A06$5.00
HIDIOUS Methods of Keystroke Injection
HIDIOUS Methods of Keystroke Injection

HN9C06$5.00
Historic Hacks in Portable Computing
Historic Hacks in Portable Computing

HN9B14$5.00
Hosting irc.2600.net - My Life with the Thrill Kill Cult
Hosting irc.2600.net - My Life with the Thrill Kill Cult

HN9A13$5.00
How to Communicate with Your Car's Network
How to Communicate with Your Car's Network

HN9B11$5.00
How to Retrofit the First Law of Robotics
How to Retrofit the First Law of Robotics

HN9A29$5.00
ICANN's New gTLD Program: Implications on Security, Stability, and Governance
ICANN's New gTLD Program: Implications on Security, Stability, and Governance

HN9B30$5.00
I'm Not a Real Friend, But I Play One on the Internet
I'm Not a Real Friend, But I Play One on the Internet

HN9B13$5.00
Information Distribution in the Arab Spring - No Hacks Required
Information Distribution in the Arab Spring - No Hacks Required

HN9A27$5.00
Infrastructure Mediated Sensing of Whole-Home Human Activity
Infrastructure Mediated Sensing of Whole-Home Human Activity

HN9C01$5.00
The Internet is for Porn! How High Heels and Fishnet Have Driven Internet Innovation and Information Security
The Internet is for Porn! How High Heels and Fishnet Have Driven Internet Innovation and Information Security

HN9A12$5.00
IPv6 Now! What Does This Mean?
IPv6 Now! What Does This Mean?

HN9C22$5.00
Jason Scott's Strange and Wonderful Digital History Argosy
Jason Scott's Strange and Wonderful Digital History Argosy

HN9B10$5.00
Keynote Address - William Binney
Keynote Address - William Binney

HN9A05$5.00
Keynote Address - The Yes Men
Keynote Address - The Yes Men

HN9A17$5.00
"Kill The Internet"
"Kill The Internet"

HN9A07$5.00
Legal Processes As Infrastructure Attacks
Legal Processes As Infrastructure Attacks

HN9B05$5.00
Make Your Laws: Practical Liquid Democracy
Make Your Laws: Practical Liquid Democracy

HN9C09$5.00
Manufacturing Modern Computer Chips
Manufacturing Modern Computer Chips

HN9C27$5.00
Mastering Master-Keyed Systems
Mastering Master-Keyed Systems

HN9A09$5.00
Messing with Nmap Through Smoke and Mirrors
Messing with Nmap Through Smoke and Mirrors

HN9C02$5.00
"No Natural Resources Were Hurt Assembling This Sofa"
"No Natural Resources Were Hurt Assembling This Sofa"

HN9C11$5.00
Nymwars: Fighting for Anonymity and Pseudonymity on the Internet
Nymwars: Fighting for Anonymity and Pseudonymity on the Internet

HN9B08$5.00
Occupy the Airwaves: Tools to Empower Community Radio Stations
Occupy the Airwaves: Tools to Empower Community Radio Stations

HN9A14$5.00
Old School Phreaking
Old School Phreaking

HN9A34$5.00
The Open Secure Telephony Network
The Open Secure Telephony Network

HN9A33$5.00
The Original WWII Hackers
The Original WWII Hackers

HN9C20$5.00
Patents: How to Get Them and How to Beat Them
Patents: How to Get Them and How to Beat Them

HN9C18$5.00
Phone Phreak Confidential: The Backstory of the History of Phone Phreaking
Phone Phreak Confidential: The Backstory of the History of Phone Phreaking

HN9A16$5.00
Practical Insecurity in Encrypted Radio
Practical Insecurity in Encrypted Radio

HN9B15$5.00
Printable Electronics and the Future of Open Hardware
Printable Electronics and the Future of Open Hardware

HN9C10$5.00
Privacy - A Postmortem (or Cell Phones, GPS, Drones, Persistent Dataveillance, Big Data, Smart Cameras and Facial Recognition, The Internet of Things, and Government Data Centers Vacuuming Google and Facebook, Oh My!)
Privacy - A Postmortem (or Cell Phones, GPS, Drones, Persistent Dataveillance, Big Data, Smart Cameras and Facial Recognition, The Internet of Things, and Government Data Centers Vacuuming Google and Facebook, Oh My!)

HN9A20A-B$5.00
Privacy by Design - a Dream for a Telecommunications Provider That Uses Strong Cryptography to Ensure Your Privacy
Privacy by Design - a Dream for a Telecommunications Provider That Uses Strong Cryptography to Ensure Your Privacy

HN9B29$5.00
Privacy Tricks for Activist Web Developers
Privacy Tricks for Activist Web Developers

HN9C17$5.00
Project Byzantium: An Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse
Project Byzantium: An Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse

HN9B19$5.00
Protecting Your Data from the Cops
Protecting Your Data from the Cops

HN9A15$5.00
Pwn the Drones: A Survey of UAV Hacks and Exploits
Pwn the Drones: A Survey of UAV Hacks and Exploits

HN9A19$5.00
Real Advances in Android Malware
Real Advances in Android Malware

HN9C04$5.00
Recent Advances in Single Packet Authorization
Recent Advances in Single Packet Authorization

HN9C25$5.00
Re-wired: Hacking the Auditory Experience
Re-wired: Hacking the Auditory Experience

HN9C30$5.00
SCADA/PLC Exploitation and Disclosure
SCADA/PLC Exploitation and Disclosure

HN9A18$5.00
Sierra Zulu. Or How to Create a Feature Film About the Digital Age - and Why That's Pretty Hard
Sierra Zulu. Or How to Create a Feature Film About the Digital Age - and Why That's Pretty Hard

HN9A11$5.00
The Smartphone Penetration Testing Framework
The Smartphone Penetration Testing Framework

HN9B01$5.00
Social Engineering
Social Engineering

HN9A22$5.00
Solving More Than #firstworldproblems
Solving More Than #firstworldproblems

HN9C12$5.00
Spy Improv: Reality Unfiltered
Spy Improv: Reality Unfiltered

HN9A25$5.00
The State of HTTPS
The State of HTTPS

HN9C32$5.00
The State of Open Source Hardware
The State of Open Source Hardware

HN9A02$5.00
Taking a Bite Out of Logs with Sagan
Taking a Bite Out of Logs with Sagan

HN9A21$5.00
Technology to Change Society: What Not to Do
Technology to Change Society: What Not to Do

HN9B02$5.00
Testing the Two Party Tyranny and Open Source Everything: The Battle for the Soul of the Republic
Testing the Two Party Tyranny and Open Source Everything: The Battle for the Soul of the Republic

HN9B03$5.00
Twitter Revolution Meets Surveillance State: Now What?
Twitter Revolution Meets Surveillance State: Now What?

HN9B20$5.00
Using a Space Camp Model for Next Generation Security Training
Using a Space Camp Model for Next Generation Security Training

HN9B04$5.00
Using Browser-based Tools to Open Up the Web
Using Browser-based Tools to Open Up the Web

HN9C26$5.00
The Weather is Not Boring! Forecasting, Following, and Photographing Storms
The Weather is Not Boring! Forecasting, Following, and Photographing Storms

HN9C19$5.00
We Will Be Legion: Decentralizing the Web
We Will Be Legion: Decentralizing the Web

HN9C07$5.00
When the Founder is Gone: Longevity for Open Projects
When the Founder is Gone: Longevity for Open Projects

HN9A26$5.00
Why Browser Cryptography is Bad and How We Can Make It Great
Why Browser Cryptography is Bad and How We Can Make It Great

HN9C13$5.00
Why Names Matter: How Online Identity is Defining the Future of the Internet
Why Names Matter: How Online Identity is Defining the Future of the Internet

HN9C29$5.00
Why You Shouldn't Write Off Higher Education, Young Grasshopper
Why You Shouldn't Write Off Higher Education, Young Grasshopper

HN9A08$5.00
WikiLeaks, Whistleblowers, and the War on the First Amendment
WikiLeaks, Whistleblowers, and the War on the First Amendment

HN9A10$5.00
Your Cell Phone is Covered in Spiders! (An Overview of Mobile Device Security)
Your Cell Phone is Covered in Spiders! (An Overview of Mobile Device Security)

HN9B23$5.00
AUDIO ONLY
AUDIO ONLY

HN9AUD$5.00
EVERYTHING
EVERYTHING

HN9ALNormally: $500.00Discounted Price: $399.00