Quick Overview: For more than five years, firewall vendors have been under persistent, cyclical struggle against a well-resourced and relentless ... This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ... This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ...

Def Con 33 Post Quantum - Detailed Overview & Context

For more than five years, firewall vendors have been under persistent, cyclical struggle against a well-resourced and relentless ... This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ... This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ... The accelerating evolution of technology, specifically AI, has created a "meta-system" so complex and intertwined with all domains ... When Liberty Safe was found to have provided safe unlock codes to authorities, it made us wonder; how was it even possible for ... "How NOT to Perform a Covert Entry Assessment" is a no B.S. discussion that covers what not to do during covert entry ...

This video contains the recording of my mainstage talk at What is it actually like to support and balance a global anonymity network, with users ranging from political dissidents to national ... Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept ... What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ... For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...

Photo Gallery

DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew  Brandt
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh
DEF CON 33 - QRAMM: The Cryptographic Migration to a Post Quantum World -  Emily Fane, Abdel Sy Fane
Post-Quantum Cryptography: the Good, the Bad, and the Powerful
DEF CON 33 - Thinking Like a Hacker in the Age of AI - Richard 'neuralcowboy' Thieme
DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James Rowley
DEF CON 33 - How NOT to Perform Covert Entry Assessments - Brent White, Tim Roberts
DEF CON 33 - Bio Cryptography is the Game Genie in a post quantum dystopia - James Utley, PhD
DEFCON33 - Turning Microsoft's Login Page into our Phishing Infrastructure - Keanu Nys
DEF CON 33 - Stories from a Tor dev - Roger 'arma' Dingledine
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored