HOPE Number Six (2006)

DVDs from our sixth hacker conference can be purchased here and an online stream can be viewed for free. Each disc is only $5 and is completely uncut and commercial-free. There's a significant discount for anyone getting a full set. We also have an audio disc of every talk in 128 kbps high fidelity audio.

HOPE Number Six was unique in that all attendees and speakers were assigned numbers and referred to by them throughout the weekend. We had a kind of Prisoner theme going and it went surprisingly smoothly.

There were two full tracks and an unscheduled track, along with all of the activities taking place on the second floor. The first track was known as "Area A" and the second track "Area B." The third, unscheduled (and unrecorded), track was held in "Area C" down the hall.

Once more, we had three separate keynotes: Richard Stallman (Friday), Michael Hart (Saturday), and Jello Biafra (Sunday). This was also the year when featured speaker and private investigator Steven Rambam was arrested at the conference, something that made his scheduled panel on privacy uniquely interesting. He eventually gave his talk - four months later. That presentation is also included here.

To order, just click the button(s) near the prisoner. Click on the titles for descriptions of the talks and panels or to see the video in non-DVD quality.








OH WHAT THE HELL I'LL JUST BUY THEM ALL
OH WHAT THE HELL I'LL JUST BUY THEM ALL

HN6ALNormally: $355.00Discounted Price: $249.00
YOU KNOW WHAT? JUST GIVE ME ALL THE AUDIO
YOU KNOW WHAT? JUST GIVE ME ALL THE AUDIO

$5.00
2600 Meetings: A Valuable Resource or a Waste of Time?
2600 Meetings: A Valuable Resource or a Waste of Time?

HN6A13$5.00
Aether Madness with the Prometheus Radio Project
Aether Madness with the Prometheus Radio Project

HN6A12$5.00
Alienation and Engagement
Alienation and Engagement

HN6B24$5.00
The Art of Electronic Deduction
The Art of Electronic Deduction

HN6B08$5.00
Basics of Forensic Recovery
Basics of Forensic Recovery

HN6A33$5.00
Binary Revolution Radio
Binary Revolution Radio

HN6B14$5.00
Bin Laden, National Intelligence, and How NOT to Spend the Taxpayer's Treasure
Bin Laden, National Intelligence, and How NOT to Spend the Taxpayer's Treasure

HN6B09$5.00
Breaking Down the Web of Trust
Breaking Down the Web of Trust

HN6B26$5.00
Building a Hacker Space
Building a Hacker Space

HN6A28$5.00
Building the Anti-Big Brother Databases
Building the Anti-Big Brother Databases

HN6B04$5.00
Can Security Detectors be Hacked?
Can Security Detectors be Hacked?

HN6B32$5.00
Citizen Engineer - Consumer Electronics Hacking and Open Source Hardware
Citizen Engineer - Consumer Electronics Hacking and Open Source Hardware

HN6A18$5.00
Comparison of WAN Routing Protocols
Comparison of WAN Routing Protocols

HN6B39$5.00
Constructing Cryptographic Protocols
Constructing Cryptographic Protocols

HN6B25$5.00
Coupon Hacking
Coupon Hacking

HN6B22$5.00
The CryptoPhone Project
The CryptoPhone Project

HN6B36$5.00
E-gold - As Misunderstood As Hackers
E-gold - As Misunderstood As Hackers

HN6B15$5.00
Exploring Your World with Open Source GIS, GPS, and Google Maps
Exploring Your World with Open Source GIS, GPS, and Google Maps

HN6A34$5.00
Europe Has Hackers Too
Europe Has Hackers Too

HN6A09$5.00
Everything You Ever Wanted to Know About Spying and Intelligence
Everything You Ever Wanted to Know About Spying and Intelligence

HN6A29A-B$5.00
Flash Sucks for Advertisers - The Digital Divide
Flash Sucks for Advertisers - The Digital Divide

HN6B01$5.00
The Future of Wireless Pen Testing
The Future of Wireless Pen Testing

HN6A10$5.00
The Geeky, Personal, and Social Impact Sides of Creating Defensive Technology
The Geeky, Personal, and Social Impact Sides of Creating Defensive Technology

HN6A31$5.00
Ghosts (and Zombies) in the Machine
Ghosts (and Zombies) in the Machine

HN6B35$5.00
Hack the Palate! How to Set Up a Kitchen Hack Lab
Hack the Palate! How to Set Up a Kitchen Hack Lab

HN6B27$5.00
Hackers and Academia
Hackers and Academia

HN6A02$5.00
Hackers in Prison
Hackers in Prison

HN6A25$5.00
Hacking Copyright and Culture
Hacking Copyright and Culture

HN6B05$5.00
Hacking the Mind: Hypnosis, NLP, and Shellcode
Hacking the Mind: Hypnosis, NLP, and Shellcode

HN6B11$5.00
The HOPE Net: What Worked and What Didn't
The HOPE Net: What Worked and What Didn't

HN6A39$5.00
HOPE Number Six Closing Ceremonies
HOPE Number Six Closing Ceremonies

HN6A40$5.00
How to Steal Someone's Implanted RFID - And Why You'd Want To
How to Steal Someone's Implanted RFID - And Why You'd Want To

HN6A03$5.00
How to Talk to the Mainstream Media
How to Talk to the Mainstream Media

HN6B13$5.00
IBOC vs. DAB-T: In-Band vs. Multiplexed Digital Radio
IBOC vs. DAB-T: In-Band vs. Multiplexed Digital Radio

HN6B19$5.00
Keynote Address - Richard Stallman
Keynote Address - Richard Stallman

HN6A07$5.00
Keynote Address - Michael Hart
Keynote Address - Michael Hart

HN6A20$5.00
Keynote Address - Jello Biafra
Keynote Address - Jello Biafra

HN6A36$5.00
Law Enforcement Wiretaps: Background and Vulnerabilities
Law Enforcement Wiretaps: Background and Vulnerabilities

HN6A27$5.00
The Life and Times of Alan Turing, Father of the Computer
The Life and Times of Alan Turing, Father of the Computer

HN6B03$5.00
Lockpicking: Exploits for Mechanical Locks
Lockpicking: Exploits for Mechanical Locks

HN6A05$5.00
Low Level Firmware Analysis and Hacking
Low Level Firmware Analysis and Hacking

HN6B16$5.00
Magnetic Stripe Technology and the New York City MetroCard
Magnetic Stripe Technology and the New York City MetroCard

HN6A04$5.00
Making Reliable Links Using WiFi
Making Reliable Links Using WiFi

HN6B20$5.00
Managing Your Company's Intellectual Property: An Introduction to IT Security
Managing Your Company's Intellectual Property: An Introduction to IT Security

HN6B30$5.00
The Monochrom Collective
The Monochrom Collective

HN6B06$5.00
Network Monitoring and the Law
Network Monitoring and the Law

HN6A01$5.00
The New Engineers of Graffiti
The New Engineers of Graffiti

HN6B29$5.00
"Off The Hook" - The Indecent Version
"Off The Hook" - The Indecent Version

HN6A11$5.00
Password Cracking and Time-Memory Tradeoff
Password Cracking and Time-Memory Tradeoff

HN6B23$5.00
Phone Phreaking 101
Phone Phreaking 101

HN6B18$5.00
Privacy Is Dead - Get Over It (belated version)
Privacy Is Dead - Get Over It (belated version)

HN6C01-03$5.00
Privacy is Dead - Get Over It (conference version)
Privacy is Dead - Get Over It (conference version)

HN6A23$5.00
Privacy through Technology: A Hands-On
Privacy through Technology: A Hands-On

HN6B33$5.00
Proactively Secure Programming Techniques
Proactively Secure Programming Techniques

HN6B07$5.00
Project MF
Project MF

HN6A26$5.00
Pseudonymous Software Development and Strong Distribution
Pseudonymous Software Development and Strong Distribution

HN6B37$5.00
Radio Communications for Hackers, Amateurs, and Activists
Radio Communications for Hackers, Amateurs, and Activists

HN6A16$5.00
Retrocomputing
Retrocomputing

HN6A19$5.00
RFID Privacy - Old Threats and New Attacks
RFID Privacy - Old Threats and New Attacks

HN6B02$5.00
Selfness-Copyfight: From Censorship to New Business Models
Selfness-Copyfight: From Censorship to New Business Models

HN6B38$5.00
Social Engineering
Social Engineering

HN6A35$5.00
TrackSploits
TrackSploits

HN6B31$5.00
Under The Desk at MIT
Under The Desk at MIT

HN6B17$5.00
Underground Documentaries: The Art of the Interview and the Access
Underground Documentaries: The Art of the Interview and the Access

HN6A38$5.00
Urban Exploring: Hacking the Physical World
Urban Exploring: Hacking the Physical World

HN6A32$5.00
Virtual Private Servers and the (Free) Open Source PBX
Virtual Private Servers and the (Free) Open Source PBX

HN6B28$5.00
VoIP Unlocking
VoIP Unlocking

HN6B21$5.00
Vulnerabilities in a Connected Future
Vulnerabilities in a Connected Future

HN6B34$5.00
Weird Technology
Weird Technology

HN6B10$5.00
Wireless Security Flaws
Wireless Security Flaws

HN6A17$5.00