Press Kit: Difference between revisions
(→Projects: ditto cleanup on md5 cert attack listing; could use better explanation of what the attack does though, as mine is kinda awkward) |
(→Projects: + video link for md5; video for cold boot is down on both links from http://events.ccc.de/congress/2008/wiki/Conference_Recordings) |
||
Line 44: | Line 44: | ||
* [http://www.torproject.org/ Tor anonymity project] allows users to use the Internet anonymously by sending traffic through several other computers before its destination | * [http://www.torproject.org/ Tor anonymity project] allows users to use the Internet anonymously by sending traffic through several other computers before its destination | ||
* [http://citp.princeton.edu/memory/ The Cold Boot Attack] allows attackers to extract information (such as encryption keys) from RAM after a computer has been turned off (won [http://www.usenix.org/events/sec08/tech/ USENIX Security 2008] - Best Student Paper) | * [http://citp.princeton.edu/memory/ The Cold Boot Attack] allows attackers to extract information (such as encryption keys) from RAM after a computer has been turned off (won [http://www.usenix.org/events/sec08/tech/ USENIX Security 2008] - Best Student Paper) | ||
* [http://www.win.tue.nl/hashclash/rogue-ca/ MD5 considered harmful today: Creating a rogue CA certificate] allows attackers to duplicate a vulnerable SSL certificate authority's signing cert, and thereby falsely and undetectably pretend to be another website (won [http://www.iacr.org/conferences/crypto2009 CRYPTO 2009] - [http://www.win.tue.nl/~bdeweger/award.html Best Paper]). | * [http://www.win.tue.nl/hashclash/rogue-ca/ MD5 considered harmful today: Creating a rogue CA certificate] ([http://mirrors.dotsrc.org/congress/25C3/video_h264_720x576/25c3-3023-en-making_the_theoretical_possible.mp4 video]) allows attackers to duplicate a vulnerable SSL certificate authority's signing cert, and thereby falsely and undetectably pretend to be another website (won [http://www.iacr.org/conferences/crypto2009 CRYPTO 2009] - [http://www.win.tue.nl/~bdeweger/award.html Best Paper]). |
Revision as of 17:44, 18 November 2009
Press contact: press@noisebridge
We are located at 2169 Mission St., San Francisco.
We've gotten press coverage before, take a look.
What we do
Noisebridge is a hacker space.
Hacker, as in "people who like making new things and exploring how old ones work". (See also these two essays.)
See our Events page for examples of what we do.
Probably the best time for press to come to the space to meet a lot of people would be during 5 Minutes of Fame, our monthly series of lightning talks. Of course, if any of our other events interest you, you can come to those also.
We ask that you first contact us at the press email above before coming to the space, and identify yourself as a member of the press to anyone you speak to. The easiest way to do this is to ask someone to introduce you to the group at the beginning of an event.
Please note that photography is not allowed in the space without the permission of the people being photographed.
Founders
- Mitch Altman, creator of the TV-B-Gone (pics)
- Jacob Appelbaum; Researcher and software developer - for more information visit his Noisebridge user page.
- Andy Isaacson, kernel hacker, software engineer, and sometimes autonomous blimp tinkerer (pics)
- Rachel McConnell (pics)
- David Molnar
- Noah Balmer
- and a cast of dozens...
Projects
Here are some projects that our members are or have been involved with:
- 5 Minutes of Fame (video, live and archived streaming) Noisebridge's monthly series of lightning talks on widely diverse subjects
- Brain Machine (details) creates hallucinations and aids meditation by flashing lights and sound with special goggles
- MakerBot lets you create almost anything up to 4"x4"x6" in size out of ABS plastic
- Northpaw Anklet (details) lets the wearer instinctively sense which direction is North
- TV-B-Gone makes it easy to turn of TVs
- Tor anonymity project allows users to use the Internet anonymously by sending traffic through several other computers before its destination
- The Cold Boot Attack allows attackers to extract information (such as encryption keys) from RAM after a computer has been turned off (won USENIX Security 2008 - Best Student Paper)
- MD5 considered harmful today: Creating a rogue CA certificate (video) allows attackers to duplicate a vulnerable SSL certificate authority's signing cert, and thereby falsely and undetectably pretend to be another website (won CRYPTO 2009 - Best Paper).