Covert entry

In a time where so many conferences are focusing on cybering, A/S/L and the potholes on the information superhighway, t2’14 has two speakers demonstrating how IT security and physical access walk hand in hand. For the first time in the history of t2, we have a lockpicking presentation in the program. Actually, make it two – one man’s exploit is another man’s lockpick.

To prevent manufacturers from getting the wrong idea, the abstracts are vague on details – the presentations themselves will not be.


Less than 40 seats left

If you’ve ever been to t2, you know that the atmosphere and networking is everything. In order to keep it that way, we have to limit the amount of attendees, meaning there is a total of 99 seats available, including speakers and organizers.

Although there is still plenty of time before the conference takes place we have passed the 50% mark and if you want to make sure you’ll actually have a seat, we advice you to register now.

Mobile track

Traditionally we have not had any named tracks per se, but this year it is quite impossible to avoid the fact that we do in fact have a mobile track on Thursday. What else can you call a set of presentations covering Android OEM vulnerabilities, iOS app reversing and low-cost IMSI catching?

If history is about to repeat itself, there will be a strong chance of mysterious mobile phone problems during the conference. Pack your burner and memorize the code words. Remember “FIST FIGHT in the TOOL ROOM” = “Drinks at the lobby bar”

Jan Saggiori and Murdoch’s Pirates

Those who weren’t too hung over from the night before might remember how Dmitry Nedospasov’s integrated circuit analysis talk last year concluded with the recommendation to read Murdoch’s Pirates.

This being t2, we noted down the name and went online to order one. Except you cannot order the book in physical form anywhere in Europe. Kindle is too new school for us as we prefer our books like our whisky – cask strenght with a drop of water and no APT. Eventually we got some from Australia and the content blew us away.

This year we have no other than Jan Saggiori himself giving an insight
into the world of pay-tv security. If you haven’t read the book yet, you should.

t2’14 schedule now online

All organizers love their own conference, it’s no secret. Looking at this year’s schedule we are both excited and humbled by the staggering number of high quality submissions received from the CFP. Today’s tweet about learning to become a real world Chloe O’Brian applies not only to Alexander Bolshev, Kokanin and Hugo Teso, but also to our other speakers. The line-up of topics is straight up Hollywood.

If the bar has been set high on previous years, this year it was even higher – we had to turn down many world class topics and want to express our gratitude to all the submitters. Not making it this time should not discourage you from submitting again in the future. Balancing the program content-wise means making hard decisions and leaving out talks we would definitely want to see.

No-holds-barred talks with important life lessons will not be the only thing keeping you warm in the late Finnish October. To celerabrate the dawning of a new t2 decade we have something special in store for this year. More about that later.

The hard limit of 99 attendees (including the speakers and t2 staff) is again in full effect. No exceptions, no excuses. Early registration is definitely recommended.