Press Kit

From Noisebridge
(Difference between revisions)
Jump to: navigation, search
(Projects: ditto cleanup on md5 cert attack listing; could use better explanation of what the attack does though, as mine is kinda awkward)
(Projects: + video link for md5; video for cold boot is down on both links from http://events.ccc.de/congress/2008/wiki/Conference_Recordings)
Line 44: Line 44:
 
* [http://www.torproject.org/ Tor anonymity project] allows users to use the Internet anonymously by sending traffic through several other computers before its destination
 
* [http://www.torproject.org/ Tor anonymity project] allows users to use the Internet anonymously by sending traffic through several other computers before its destination
 
* [http://citp.princeton.edu/memory/ The Cold Boot Attack] allows attackers to extract information (such as encryption keys) from RAM after a computer has been turned off (won [http://www.usenix.org/events/sec08/tech/ USENIX Security 2008] - Best Student Paper)
 
* [http://citp.princeton.edu/memory/ The Cold Boot Attack] allows attackers to extract information (such as encryption keys) from RAM after a computer has been turned off (won [http://www.usenix.org/events/sec08/tech/ USENIX Security 2008] - Best Student Paper)
* [http://www.win.tue.nl/hashclash/rogue-ca/ MD5 considered harmful today: Creating a rogue CA certificate] allows attackers to duplicate a vulnerable SSL certificate authority's signing cert, and thereby falsely and undetectably pretend to be another website (won [http://www.iacr.org/conferences/crypto2009 CRYPTO 2009] - [http://www.win.tue.nl/~bdeweger/award.html Best Paper]).
+
* [http://www.win.tue.nl/hashclash/rogue-ca/ MD5 considered harmful today: Creating a rogue CA certificate] ([http://mirrors.dotsrc.org/congress/25C3/video_h264_720x576/25c3-3023-en-making_the_theoretical_possible.mp4 video]) allows attackers to duplicate a vulnerable SSL certificate authority's signing cert, and thereby falsely and undetectably pretend to be another website (won [http://www.iacr.org/conferences/crypto2009 CRYPTO 2009] - [http://www.win.tue.nl/~bdeweger/award.html Best Paper]).

Revision as of 17:44, 18 November 2009

Press contact: press@noisebridge

We are located at 2169 Mission St., San Francisco.

We've gotten press coverage before, take a look.

What we do

Noisebridge is a hacker space.

Hacker, as in "people who like making new things and exploring how old ones work". (See also these two essays.)

See our Events page for examples of what we do.

Probably the best time for press to come to the space to meet a lot of people would be during 5 Minutes of Fame, our monthly series of lightning talks. Of course, if any of our other events interest you, you can come to those also.

We ask that you first contact us at the press email above before coming to the space, and identify yourself as a member of the press to anyone you speak to. The easiest way to do this is to ask someone to introduce you to the group at the beginning of an event.

Please note that photography is not allowed in the space without the permission of the people being photographed.

Founders

Projects

Here are some projects that our members are or have been involved with:

Personal tools