The Next HOPE (2010)

Here is the full package of DVDs from The Next HOPE conference! They're completely region free so they'll play regardless of where in the world you happen to be. The DVDs have no ads and are completely uncut. We also have a two-disc audio set of every talk in 128 kbps high fidelity audio.

The Next HOPE was the next conference after the last one (The Last HOPE). It's a simple enough premise, but it's been confusing people ever since we held it in July of 2010. We had a renewed spirit this time around, as we dove into the growing Wikileaks controversy with a wildly popular keynote address from Jacob Appelbaum and a controversial panel on informants featuring Adrian Lamo, the person who turned in leaker Bradley Manning to the authorities. Renowned hacker and researcher Dan Kaminsky gave our other keynote address.

Again, we had three speaker tracks, an unscheduled track, activities and villages on the second floor, along with workshops on the sixth floor of the Hotel Pennsylvania, which we were still fighting to save from demolition. Our first track was named after inventor and engineer Nikola Tesla, the second after renowned mathematician Ada Lovelace, and the third after none other than Alexander Graham Bell. The unscheduled and mostly unrecorded track was named after Samuel Morse, who, among other things, created some pretty famous code way back when.

To order, just click the button(s) next to the airships. Click on the titles for the pre-conference descriptions of these panels or to see the video in non-DVD quality.






EVERYTHING
EVERYTHING

TNHALNormally: $500.00Discounted Price: $349.00
AUDIO ONLY
AUDIO ONLY

TNHAUDA-B$5.00
2600 Meetings: Yesterday, Today, and Tomorrow
2600 Meetings: Yesterday, Today, and Tomorrow

TNHB25$5.00
American Bombe: How the U.S. Shattered the Enigma Code
American Bombe: How the U.S. Shattered the Enigma Code

TNHB30$5.00
Arse Elektronika: Sex, Tech, and the Future of Screw-It-Yourself
Arse Elektronika: Sex, Tech, and the Future of Screw-It-Yourself

TNHA05$5.00
Bakeca.it DDoS - How Evil Forces Have Been Defeated
Bakeca.it DDoS - How Evil Forces Have Been Defeated

TNHC30$5.00
Behind the Padlock: HTTPS Ubiquitous and Fragile
Behind the Padlock: HTTPS Ubiquitous and Fragile

TNHB15$5.00
The Black Suit Plan Isn't Working - Now What?
The Black Suit Plan Isn't Working - Now What?

TNHC31$5.00
Botnet Resistant Coding: Protecting Your Users from Script Kiddies
Botnet Resistant Coding: Protecting Your Users from Script Kiddies

TNHB05$5.00
"Brilliants Exploits" - A Look at the Vancouver 2010 Olympics
"Brilliants Exploits" - A Look at the Vancouver 2010 Olympics

TNHB07$5.00
Build Robots and See the World
Build Robots and See the World

TNHA10$5.00
Building and Breaking the Next HOPE Badge
Building and Breaking the Next HOPE Badge

TNHA21$5.00
Burning and Building Bridges: A Primer to Hacking the Education System
Burning and Building Bridges: A Primer to Hacking the Education System

TNHC27$5.00
Buying Privacy in Digitized Cities
Buying Privacy in Digitized Cities

TNHC08$5.00
Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks
Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks

TNHA26$5.00
Circuitbending
Circuitbending

TNHB24$5.00
Closing Ceremonies
Closing Ceremonies

TNHA31$5.00
Content of the Future
Content of the Future

TNHB03$5.00
Cooking for Geeks
Cooking for Geeks

TNHC05$5.00
CV Dazzle: Face Deception
CV Dazzle: Face Deception

TNHB32$5.00
Design of a Wireless EMG
Design of a Wireless EMG

TNHC06$5.00
Detecting and Defending Your Network from Malware Using Nepenthes
Detecting and Defending Your Network from Malware Using Nepenthes

TNHC11$5.00
Digital: A Love Story
Digital: A Love Story

TNHB04$5.00
The DMCA and ACTA vs. Academic and Professional Research:<br>How Misuse of This Intellectual Property Legislation Chills<br>Research, Disclosure, and Innovation
The DMCA and ACTA vs. Academic and Professional Research:
How Misuse of This Intellectual Property Legislation Chills
Research, Disclosure, and Innovation


TNHA27$5.00
Easy Hacks on Telephone Entry Systems
Easy Hacks on Telephone Entry Systems

TNHB09$5.00
Electronic Take Back
Electronic Take Back

TNHC04$5.00
Electronic Waste: What's Here and What's Next
Electronic Waste: What's Here and What's Next

TNHB12$5.00
Examining Costs, Benefits, and Economics in Malware and Carding Markets
Examining Costs, Benefits, and Economics in Malware and Carding Markets

TNHC03$5.00
False Domain Name Billing and Other Scams
False Domain Name Billing and Other Scams

TNHC13$5.00
A Primer on Neuroscience, Bat Echolocation, and Hacker Bio-inspiration
A Primer on Neuroscience, Bat Echolocation, and Hacker Bio-inspiration

TNHC15$5.00
Free Software: Why We Need a Big Tent
Free Software: Why We Need a Big Tent

TNHB21$5.00
The Freedom Box: How to Reclaim Privacy on the Web
The Freedom Box: How to Reclaim Privacy on the Web

TNHC29$5.00
Friday Keynote - Dan Kaminsky
Friday Keynote - Dan Kaminsky

TNHA04$5.00
From Indymedia to Demand Media: Participation,<br>Surveillance, and the Transformation of Journalism
From Indymedia to Demand Media: Participation,
Surveillance, and the Transformation of Journalism


TNHA25$5.00
Geo-Tagging: Opting-In to Total Surveillance
Geo-Tagging: Opting-In to Total Surveillance

TNHB18$5.00
GPS - It's Not the Satellites That Know Where You Are
GPS - It's Not the Satellites That Know Where You Are

TNHB01-02$5.00
Grand Theft Lazlow - How Hacking is Both the Death and Future<br>of Traditional and Interactive Publishing, Journalism, and the Media
Grand Theft Lazlow - How Hacking is Both the Death and Future
of Traditional and Interactive Publishing, Journalism, and the Media


TNHA14$5.00
Hackers for Human Rights
Hackers for Human Rights

TNHC21$5.00
Hackers without Borders: Disaster Relief and Technology
Hackers without Borders: Disaster Relief and Technology

TNHB33$5.00
Hackerspaces Forever: A Panel Presented by Hackerspaces.org
Hackerspaces Forever: A Panel Presented by Hackerspaces.org

TNHA11A-B$5.00
Hacking for an Audience: Technology Backstage at Live Shows
Hacking for an Audience: Technology Backstage at Live Shows

TNHB28$5.00
Hacking Our Biochemistry: Pharmacy and the Hacker Perspective
Hacking Our Biochemistry: Pharmacy and the Hacker Perspective

TNHB26$5.00
Hacking Out a Graphic Novel
Hacking Out a Graphic Novel

TNHC14$5.00
Hacking Terrorist Networks Logically and Emotionally
Hacking Terrorist Networks Logically and Emotionally

TNHC25$5.00
Hacking the Food Genome
Hacking the Food Genome

TNHA29$5.00
Hacking Your GPS
Hacking Your GPS

TNHB27$5.00
Hey, Don't Call That Guy a Noob:<br>Toward a More Welcoming Hacker Community
Hey, Don't Call That Guy a Noob:
Toward a More Welcoming Hacker Community


TNHB23$5.00
The HOPE Network
The HOPE Network

TNHA30$5.00
How to Bring Your Project from Idea to Reality: Make a Living Doing What You Love
How to Bring Your Project from Idea to Reality: Make a Living Doing What You Love

TNHA16$5.00
How to Run an Open Source Hardware Company
How to Run an Open Source Hardware Company

TNHA12$5.00
Informants: Villains or Heroes?
Informants: Villains or Heroes?

TNHA28$5.00
Injecting Electromagnetic Pulses into Digital Devices
Injecting Electromagnetic Pulses into Digital Devices

TNHC12$5.00
Interaction with Sensors, Receivers, Haptics, and Augmented Reality
Interaction with Sensors, Receivers, Haptics, and Augmented Reality

TNHB13$5.00
Into the Black: DPRK Exploration
Into the Black: DPRK Exploration

TNHB31$5.00
Introduction to the Chip Scene: Low Bit Music and Visuals
Introduction to the Chip Scene: Low Bit Music and Visuals

TNHB11$5.00
IPv6 Playground: New Hope Update
IPv6 Playground: New Hope Update

TNHA01$5.00
Keeping Your Job While Being a Hacker
Keeping Your Job While Being a Hacker

TNHA07$5.00
"Knock Knock Knock... Housekeeping" - The Ins and Outs of Hotel Locks
"Knock Knock Knock... Housekeeping" - The Ins and Outs of Hotel Locks

TNHA09$5.00
Light, Color, and Perception
Light, Color, and Perception

TNHC01$5.00
Lisp, The Oldest Language of the Future
Lisp, The Oldest Language of the Future

TNHC07$5.00
Locational Privacy and Wholesale Surveillance via Photo Services
Locational Privacy and Wholesale Surveillance via Photo Services

TNHB01-02$5.00
Lock Bypass without Lockpicks
Lock Bypass without Lockpicks

TNHC26$5.00
Memory Fun 101 - Memory Training for Everyone
Memory Fun 101 - Memory Training for Everyone

TNHB19$5.00
Modern CrimeWare Tools and Techniques:<br>An Analysis of Underground Resources
Modern CrimeWare Tools and Techniques:
An Analysis of Underground Resources


TNHC17$5.00
Monkeysphere: Fixing Authentication on the Net
Monkeysphere: Fixing Authentication on the Net

TNHC09$5.00
Much Ado About Randomness
Much Ado About Randomness

TNHC19$5.00
The Need for a Computer Crime Innocence Project
The Need for a Computer Crime Innocence Project

TNHA24$5.00
Net Wars Over Free Speech, Freedom, and Secrecy or How to<br>Understand the Hacker and Lulz Battle Against the Church of Scientology
Net Wars Over Free Speech, Freedom, and Secrecy or How to
Understand the Hacker and Lulz Battle Against the Church of Scientology


TNHA22$5.00
No Free Lunch: Privacy Risks and Issues in Online Gaming
No Free Lunch: Privacy Risks and Issues in Online Gaming

TNHC16$5.00
The OpenAMD Project
The OpenAMD Project

TNHB08$5.00
Own Your Phone
Own Your Phone

TNHA06$5.00
Privacy is Dead - Get Over It
Privacy is Dead - Get Over It

TNHA18A-B$5.00
PSTN-based Cartography
PSTN-based Cartography

TNHC23$5.00
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us

TNHC24$5.00
Reach Out and Touch Face: A Rant About Failing
Reach Out and Touch Face: A Rant About Failing

TNHB22$5.00
A Red Team Exercise
A Red Team Exercise

TNHB17$5.00
Risk Analysis for Dummies
Risk Analysis for Dummies

TNHC10$5.00
Rummaging in the Government's Attic: Lessons Learned from<br>More Than 1,000 Freedom of Information Act Requests
Rummaging in the Government's Attic: Lessons Learned from
More Than 1,000 Freedom of Information Act Requests


TNHA19$5.00
Saturday Keynote - Wikileaks
Saturday Keynote - Wikileaks

TNHA15$5.00
SHODAN for Penetration Testers
SHODAN for Penetration Testers

TNHC02$5.00
Simpsons Already Did It -<br>Where Do You Think the Name "Trojan" Came From Anyway?
Simpsons Already Did It -
Where Do You Think the Name "Trojan" Came From Anyway?


TNHB29$5.00
Sita Sings the Blues: A Free Culture Success Story
Sita Sings the Blues: A Free Culture Success Story

TNHB06$5.00
Smartphone Ownage: The State of Mobile Botnets and Rootkits
Smartphone Ownage: The State of Mobile Botnets and Rootkits

TNHB20$5.00
Snatch Those Waves: Prometheus Radio and the Fight for Popular Communications
Snatch Those Waves: Prometheus Radio and the Fight for Popular Communications

TNHA17$5.00
Social Engineering
Social Engineering

TNHA20$5.00
Spy Improv on Steroids - Steele Uncensored - Anything Goes
Spy Improv on Steroids - Steele Uncensored - Anything Goes

TNHA23A-D$10.00
The State of Global Intelligence
The State of Global Intelligence

TNHA02$5.00
Surf's Up! Exploring Cross Site Request Forgery (CSRF)<br>through Social Network Exploitation
Surf's Up! Exploring Cross Site Request Forgery (CSRF)
through Social Network Exploitation


TNHC18$5.00
T+40: The Three Greatest Hacks of Apollo
T+40: The Three Greatest Hacks of Apollo

TNHB14$5.00
The Telephone Pioneers of America
The Telephone Pioneers of America

TNHC22$5.00
Tor and Internet Censorship
Tor and Internet Censorship

TNHA08$5.00
Towards Open Libraries and Schools
Towards Open Libraries and Schools

TNHB10$5.00
TrackMeNot: Injecting Reasonable Doubt in Everyone's Queries
TrackMeNot: Injecting Reasonable Doubt in Everyone's Queries

TNHC28$5.00
Video Surveillance, Society, and Your Face
Video Surveillance, Society, and Your Face

TNHA13$5.00
Vintage Computing
Vintage Computing

TNHB16$5.00
Why You Should Be an Amateur
Why You Should Be an Amateur

TNHC20$5.00
Wireless Security: Killing Livers, Making Enemies
Wireless Security: Killing Livers, Making Enemies

TNHA03$5.00