Less than 20 seats left

If you’ve ever been to t2, you know that the atmosphere and networking is everything. In order to keep it that way, we have to limit the amount of attendees, meaning there is a total of 99 seats available, including speakers and organizers.

Although there is still plenty of time before the conference takes place we have passed the 80% mark and if you want to make sure you’ll actually have a seat, we advice you to register now.

t2’14 Challenge to be released 2014-09-13 10:00 EEST

Due to recent extraordinary events, we’re diverting from our usual Challenge process this year. Instead of a traditional puzzle, a captured binary will be released for crowdsourced reverse-engineering.

Background

Running assets is always difficult, however this year has been excruciating for t2 infosec. We lost one of our most prized and well placed deep cover operatives in a foreign three letter agency. Shortly after the CFP, communications stopped and we have to assume her new assignment is a permanent placement at a black site somewhere in Eastern Europe.

Luckily for us, the person was able to exfiltrate a key piece of an intelligence analysis system before disappearing. In order to turn the tables and go for the pride-and-ego down, our intention is to burn this capability once and for all.

Y-LOCKPOINT is designed for searching and analyzing compromised computer systems. Despite the OPSEC failures, which allowed us to gain access to front-end application, the binary is well-protected – preliminary analysis indicates emphasis on multi-layer protection and resistance to analysis.

Your mission, should you choose to accept it, is to participate in the crowdsourced reverse engineering effort of the acquired front-end binary.

Details

The first person to recover all content will win a free ticket to t2’14 conference. In addition to this, the creators of the Challenge will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style.

The Challenge will be released on 2014-09-13 10:00 EEST right here at t2.fi

Covert entry

In a time where so many conferences are focusing on cybering, A/S/L and the potholes on the information superhighway, t2’14 has two speakers demonstrating how IT security and physical access walk hand in hand. For the first time in the history of t2, we have a lockpicking presentation in the program. Actually, make it two – one man’s exploit is another man’s lockpick.

To prevent manufacturers from getting the wrong idea, the abstracts are vague on details – the presentations themselves will not be.

 

Less than 40 seats left

If you’ve ever been to t2, you know that the atmosphere and networking is everything. In order to keep it that way, we have to limit the amount of attendees, meaning there is a total of 99 seats available, including speakers and organizers.

Although there is still plenty of time before the conference takes place we have passed the 50% mark and if you want to make sure you’ll actually have a seat, we advice you to register now.

Mobile track

Traditionally we have not had any named tracks per se, but this year it is quite impossible to avoid the fact that we do in fact have a mobile track on Thursday. What else can you call a set of presentations covering Android OEM vulnerabilities, iOS app reversing and low-cost IMSI catching?

If history is about to repeat itself, there will be a strong chance of mysterious mobile phone problems during the conference. Pack your burner and memorize the code words. Remember “FIST FIGHT in the TOOL ROOM” = “Drinks at the lobby bar”

Jan Saggiori and Murdoch’s Pirates

Those who weren’t too hung over from the night before might remember how Dmitry Nedospasov’s integrated circuit analysis talk last year concluded with the recommendation to read Murdoch’s Pirates.

This being t2, we noted down the name and went online to order one. Except you cannot order the book in physical form anywhere in Europe. Kindle is too new school for us as we prefer our books like our whisky – cask strenght with a drop of water and no APT. Eventually we got some from Australia and the content blew us away.

This year we have no other than Jan Saggiori himself giving an insight
into the world of pay-tv security. If you haven’t read the book yet, you should.

t2’14 schedule now online

All organizers love their own conference, it’s no secret. Looking at this year’s schedule we are both excited and humbled by the staggering number of high quality submissions received from the CFP. Today’s tweet about learning to become a real world Chloe O’Brian applies not only to Alexander Bolshev, Kokanin and Hugo Teso, but also to our other speakers. The line-up of topics is straight up Hollywood.

If the bar has been set high on previous years, this year it was even higher – we had to turn down many world class topics and want to express our gratitude to all the submitters. Not making it this time should not discourage you from submitting again in the future. Balancing the program content-wise means making hard decisions and leaving out talks we would definitely want to see.

No-holds-barred talks with important life lessons will not be the only thing keeping you warm in the late Finnish October. To celerabrate the dawning of a new t2 decade we have something special in store for this year. More about that later.

The hard limit of 99 attendees (including the speakers and t2 staff) is again in full effect. No exceptions, no excuses. Early registration is definitely recommended.