Last year’s crowdsourcing effort was a definite success and that inspired us to go for a crowdsourced cryptanalysis mission.
After last year’s t2 we spent the cold winter months browsing through online auctions for historical data processing equipment. Just like LinkedIn profiles revealing sensitive projects and inside information, old devices and mass storage units can be a treasure trove for the lucky.
The mystery box we received in the mail is suspected to be a part of secure communication infrastructure between nation states. After hard work and tedious efforts, we managed to extract an executable from the device for analysis.
The first person to recover all content will win a free ticket to t2’15 conference. In addition to this, the creators of the Challenge will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style.
The Challenge will be released on 2015-09-19 10:00 EEST right here at t2.fi
So many CFP entries, so little time. The schedule for 2015 is ready
and finalized, and as always, we’re pretty excited! There’s a mix of
high level and low level, offense and defense, cocktails and
networking. ..and by the way, our keynote speaker is @headhntr.
This year we’re continuing the tradition of not having dedicated
tracks – therefore Thursday’s string of OPSEC presentations is just a glitch in the random number generator. The same glitch also caused Alexander Bolshev and Boris Ryutin to receive two one hour slots for their exploit development workshop. AVR microcontrollers have never been this interesting!
As anybody who’s been to security conferences during the last decade knows, it takes something special to have a solid fuzzing presentation – Nils‘ “Windows kernel fuzzing” definitely
hits the mark. Speaking of awesomeness previously available only with nation state budgets, the guys from Tel Aviv university are
demonstrating what EMSEC means in practice. You probably want to take notes with pencil and paper this time.
The hard limit of 99 attendees (including the speakers and t2 staff)
is again in full effect. No exceptions, no excuses. Early registration
is definitely recommended. As always, t2’15 will take place in Radisson Blu Royal Hotel Helsinki.
Making predictions is easy when you have friends in low places. They indeed helped us secure a solid 5/5 performance for our 2015
predictions already during H1. It’s all about making your own luck –
Lady Fortune is not that random when you know what’s happening in the operational area.
To summarize what has happened during the past few months:
This brings us to the CFP – it’s still open a couple of weeks and waiting for your submissions. If you want to present your research to a technical audience, enjoy cold weather in Helsinki and/or meet hacker-minded people from all over the world, t2 is definitely your conference.
The registration will open soon after the first rounds of CFP has been accepted. Last year we sold all of the seats well before the event – if you are looking to buy 5 or more tickets, please contact us now.
Why spend your valuable conference time in the longest lines you have seen in your life, getting a sun burn or totally lost in the canals with your rental boat, being deprived of chewing gum or waking up in Nong Palai without any recollection how you got there? Helsinki offers you the safe and comfortable low-temperature alternative with a chance of first snow. Finland, the home country of many things you thought came from Japan.
This is the country where the strong demo scene culture has spawned multiple globally successful game companies, rally cross is also known as winter commute and people are sometimes so silent you wonder whether their opsec is 6/5 or if they are just mute. Silence doesn’t mean social situations have to be totally awkward – just ask if anybody wants have a drink and go to a sauna, and soon you are sitting naked in a steamy hot room beating yourself with a bath whisk. Experiencing Finland is extremely safe due to standards compliance and decent level of government regulation.
t2’15 offers you an audience with a taste for technical security presentations containing original content. This is your chance to showcase the latest research and lessons in offensive cryptography, hardware hacking, art of developing and cultivating assets, next generation cyber-APT-attribution, compromising nation states, displaying calculators, blinking leds or making games run (in several wrong places), anti-forensics, covert entry, enterprise defense tactics and techniques, censored research..or something completely different warming the hearts of seasoned con-goers.
The advisory board will be reviewing submissions until 2015-07-15 23:59:59 UTC. First come, first served. Submissions will not be returned.
Quick facts for speakers
+ presentation length 60-120 minutes, in English
+ complimentary travel and accommodation
+ decent speaker hospitality benefits
+ no marketing or product propaganda
Still not sure if this is for you? Check out the blast from the past
How to submit
Fill out the form at https://t2.fi/action/cfp
ProTip: Incomplete submissions will not be reviewed.
Please mark your calendars – t2’15 infosec will take place in Helsinki, Finland, from October 29 to 30, 2015.