Click to enlargeHOPE X (2014)

The DVDs from HOPE X are now available! As always, we have no region restrictions or DRM on these discs, so you're free to copy them and watch them on whatever device you choose.

Remember, your purchases here help make HOPE possible and also keep our various archiving projects alive. We've kept the price as low as we can to ensure as many of you as possible are able to get your own copies. Also, if you buy the entire set, the price is even better. And, as always, we have 128 kbps audio available of every talk on a special two-disc DVD set. It's not always about the video - it's mostly about what is said during these incredible talks.

HOPE X was held at the Hotel Pennsylvania in New York City on July 18-20, 2014. The theme was dissent and we had our fair share of famous dissidents on hand: Edward Snowden, Daniel Ellsberg, Thomas Drake, and many more. We named our four speaker rooms after some famous whistleblowers: Bradley/Chelsea Manning, Frank Serpico, Frank Olson, and perhaps the most famous future whistleblower of all: You.

To order, just click the button(s) next to the phone logos. Click on the titles for descriptions of the talks and panels.



EVERYTHING
EVERYTHING

HXALNormally: $490.00Discounted Price: $399.00
AUDIO ONLY
AUDIO ONLY

HXAUD$5.00
A Conversation with Edward Snowden
A Conversation with Edward Snowden

HXA18$5.00
Keynote Address - Daniel Ellsberg
Keynote Address - Daniel Ellsberg

HXA17$5.00
The Hacker Wars - A Conversation with NSA Whistleblower Thomas Drake
The Hacker Wars - A Conversation with NSA Whistleblower Thomas Drake

HXA05$5.00
Apophenia: Hunting for the Ghost in the Machine
Apophenia: Hunting for the Ghost in the Machine

HXB05$5.00
Are You Ready to SIP the Kool-Aid?
Are You Ready to SIP the Kool-Aid?

HXB01$5.00
Art under Mass Surveillance
Art under Mass Surveillance

HXB11$5.00
Ask the EFF - This Year on the Internet
Ask the EFF - This Year on the Internet

HXA15$5.00
Barrett Brown and Anonymous: Persecution of Information Activists
Barrett Brown and Anonymous: Persecution of Information Activists

HXA03$5.00
A Beautiful Mosaic: How to Use FOIA to Fight Secrecy, Explore History, and Strengthen American Democracy
A Beautiful Mosaic: How to Use FOIA to Fight Secrecy, Explore History, and Strengthen American Democracy

HXB03$5.00
Biohacking and DIYbiology North of the 45th Parallel
Biohacking and DIYbiology North of the 45th Parallel

HXA22$5.00
Bless the Cops and Keep Them Far from Us: Researching, Exploring, and Publishing Findings While Staying out of Legal Trouble
Bless the Cops and Keep Them Far from Us: Researching, Exploring, and Publishing Findings While Staying out of Legal Trouble

HXA14$5.00
Blinding The Surveillance State
Blinding The Surveillance State

HXA30$5.00
Bootkits: Step-by-Step
Bootkits: Step-by-Step

HXC27$5.00
Bringing Down the Biological System: How Poisons Hack the Body
Bringing Down the Biological System: How Poisons Hack the Body

HXB27$5.00
Building an Open Source Cellular Network at Burning Man
Building an Open Source Cellular Network at Burning Man

HXA09$5.00
Can You Patent Software?
Can You Patent Software?

HXB07$5.00
Closing Ceremonies
Closing Ceremonies

HXA32$5.00
Codesigning Countersurveillance
Codesigning Countersurveillance

HXC23$5.00
Community Infrastructure for FOSS Projects
Community Infrastructure for FOSS Projects

HXB32$5.00
Community Owned and Operated Cellular Networks in Rural Mexico
Community Owned and Operated Cellular Networks in Rural Mexico

HXA08$5.00
Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs
Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs

HXC11$5.00
Cultures of Open Source: A Cross-Cultural Analysis
Cultures of Open Source: A Cross-Cultural Analysis

HXA28$5.00
Cyber Security in Humanitarian Projects as a Social Justice Issue
Cyber Security in Humanitarian Projects as a Social Justice Issue

HXB26$5.00
Dark Mail
Dark Mail

HXA11$5.00
Disruptive Wearable Technology
Disruptive Wearable Technology

HXA19$5.00
DIY Usability Research: A Crash Course in Guerrilla Data Gathering
DIY Usability Research: A Crash Course in Guerrilla Data Gathering

HXC21$5.00
Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists
Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists

HXB31$5.00
Echoes of Returns Lost: The History of The Telecom Digest
Echoes of Returns Lost: The History of The Telecom Digest

HXC32$5.00
Electric Waste Orchestra: Learning and Teaching Music, Electronics, Programming, and Repurposing
Electric Waste Orchestra: Learning and Teaching Music, Electronics, Programming, and Repurposing

HXB19$5.00
Elevator Hacking: From the Pit to the Penthouse
Elevator Hacking: From the Pit to the Penthouse

HXA26$5.00
Ergonomic Human Interface Hacking
Ergonomic Human Interface Hacking

HXC10$5.00
Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era
Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era

HXA25$5.00
Fuckhackerfucks! An Audience Bashing
Fuckhackerfucks! An Audience Bashing

HXB29$5.00
G-code: The Programming Language of Machining and 3D Printers
G-code: The Programming Language of Machining and 3D Printers

HXC08$5.00
(Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance
(Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance

HXB17$5.00
Hacking Money, from Alexander the Great to Zerocoin
Hacking Money, from Alexander the Great to Zerocoin

HXB20$5.00
Hacking the Patent System: The Vulnerabilities That Allow for Bad Patents and How to Stop Them
Hacking the Patent System: The Vulnerabilities That Allow for Bad Patents and How to Stop Them

HXB06$5.00
Hearses and Hand-Held Calculators: The Unlikely Connections That Shaped Modern Technology and Tech Culture
Hearses and Hand-Held Calculators: The Unlikely Connections That Shaped Modern Technology and Tech Culture

HXB16$5.00
The Hidden World of Game Hacking
The Hidden World of Game Hacking

HXB23$5.00
How to Prevent Security Afterthought Syndrome
How to Prevent Security Afterthought Syndrome

HXB13$5.00
HTTP Must Die
HTTP Must Die

HXB08$5.00
I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence
I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence

HXC12$5.00
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

HXC06$5.00
The Internet Society Speaks – The History, Futures, and Alternate Directions of the Internet and Its Governance
The Internet Society Speaks – The History, Futures, and Alternate Directions of the Internet and Its Governance

HXB09$5.00
Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit
Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit

HXB34$5.00
Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014
Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014

HXC25$5.00
Lessons Learned from Implementing Real Life Whistleblowing Platforms
Lessons Learned from Implementing Real Life Whistleblowing Platforms

HXA24$5.00
Lockpicking, a Primer
Lockpicking, a Primer

HXA06$5.00
The Many Faces of LockSport
The Many Faces of LockSport

HXA07$5.00
Media, Popular Misconceptions, and the CSI Effect – What Does It Mean for InfoSec and Tech Policy?
Media, Popular Misconceptions, and the CSI Effect – What Does It Mean for InfoSec and Tech Policy?

HXA02$5.00
North Korea - Using Social Engineering and Concealed Electronic Devices to Gather Information in the World’s Most Restrictive Nation
North Korea - Using Social Engineering and Concealed Electronic Devices to Gather Information in the World’s Most Restrictive Nation

HXA29$5.00
Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack
Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack

HXC02$5.00
Per Speculum In Ænigmate
Per Speculum In Ænigmate

HXC07$5.00
Postprivacy: A New Approach to Thinking about Life in the Digital Sphere
Postprivacy: A New Approach to Thinking about Life in the Digital Sphere

HXC09$5.00
PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It
PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It

HXA27$5.00
Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, and the Advertising-Funded Web
Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, and the Advertising-Funded Web

HXA31$5.00
Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex
Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex

HXB18$5.00
#radBIOS: Yelling a Database across the Room
#radBIOS: Yelling a Database across the Room

HXC14$5.00
The Repair Movement
The Repair Movement

HXA01$5.00
Reverse Engineering - Unlocking the Locks
Reverse Engineering - Unlocking the Locks

HXC20$5.00
Rickrolling Your Neighbors with Google Chromecast
Rickrolling Your Neighbors with Google Chromecast

HXB12$5.00
The Science of Surveillance
The Science of Surveillance

HXC28$5.00
A Sea of Parts
A Sea of Parts

HXC22$5.00
SecureDrop: A WikiLeaks in Every Newsroom
SecureDrop: A WikiLeaks in Every Newsroom

HXA16$5.00
Securing a Home Router
Securing a Home Router

HXC30$5.00
The Sex Geek as Culture Hacker
The Sex Geek as Culture Hacker

HXB24$5.00
Shortwave Pirate Radio and Oddities of the Spectrum
Shortwave Pirate Radio and Oddities of the Spectrum

HXC03$5.00
Showing Keys in Public – What Could Possibly Go Wrong?
Showing Keys in Public – What Could Possibly Go Wrong?

HXB22$5.00
Skeuomorphic Steganography
Skeuomorphic Steganography

HXC19$5.00
Social Engineering
Social Engineering

HXA23$5.00
Solve the Hard Problem
Solve the Hard Problem

HXB02$5.00
Spy Improv: Ask Me Anything
Spy Improv: Ask Me Anything

HXB25A-B$5.00
SSL++: Tales of Transport-Layer Security at Twitter
SSL++: Tales of Transport-Layer Security at Twitter

HXA10$5.00
Steepest Dissent: Small Scale Digital Fabrication
Steepest Dissent: Small Scale Digital Fabrication

HXC04$5.00
A Story of Self Publishing Success
A Story of Self Publishing Success

HXC31$5.00
Stupid Whitehat Tricks
Stupid Whitehat Tricks

HXB33$5.00
Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching
Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching

HXC01$5.00
Teaching Electronic Privacy and Civil Liberties to Government
Teaching Electronic Privacy and Civil Liberties to Government

HXB28$5.00
Technology and Jamming of XKEYSCORE
Technology and Jamming of XKEYSCORE

HXC29$5.00
This Is the X You Are Looking For
This Is the X You Are Looking For

HXB15$5.00
Threat Modeling and Security Test Planning
Threat Modeling and Security Test Planning

HXC15$5.00
Thwarting the Peasants: A Guided and Rambunctious Tour Through the 2600 DeCSS Legal Files
Thwarting the Peasants: A Guided and Rambunctious Tour Through the 2600 DeCSS Legal Files

HXA20$5.00
Travel Hacking with The Telecom Informer
Travel Hacking with The Telecom Informer

HXB30$5.00
Unmasking a CIA Criminal
Unmasking a CIA Criminal

HXA12$5.00
Updates from the Online Identity Battlefield
Updates from the Online Identity Battlefield

HXC24$5.00
Usable Crypto: New Progress in Web Cryptography
Usable Crypto: New Progress in Web Cryptography

HXC17$5.00
Using Travel Routers to Hide in Safety
Using Travel Routers to Hide in Safety

HXA13$5.00
Vigilante Justice: Masks, Guns, and Networks
Vigilante Justice: Masks, Guns, and Networks

HXC13$5.00
Visualization for Hackers: Why It’s Tricky, and Where to Start
Visualization for Hackers: Why It’s Tricky, and Where to Start

HXC16$5.00
The Web Strikes Back - Fighting Mass Surveillance with Open Standards
The Web Strikes Back - Fighting Mass Surveillance with Open Standards

HXB14$5.00
When Confidentiality and Privacy Conflict
When Confidentiality and Privacy Conflict

HXC05$5.00
When Whistleblowers Are Branded as Spies: Edward Snowden, Surveillance, and Espionage
When Whistleblowers Are Branded as Spies: Edward Snowden, Surveillance, and Espionage

HXA04$5.00
When You Are the Adversary
When You Are the Adversary

HXB21$5.00
Why the Future is Open Wireless
Why the Future is Open Wireless

HXB10$5.00
Will It Blend? How Evil Software Clogs the Pipes
Will It Blend? How Evil Software Clogs the Pipes

HXC26$5.00
Wireless Meshnets: Building the Next Version of the Web
Wireless Meshnets: Building the Next Version of the Web

HXB04$5.00
You’ve Lost Privacy, Now They’re Taking Anonymity (aka Whistleblowing is Dead - Get Over It)
You’ve Lost Privacy, Now They’re Taking Anonymity (aka Whistleblowing is Dead - Get Over It)

HXA21A-B$5.00
Your Right to Whisper: LEAP Encryption Access Project
Your Right to Whisper: LEAP Encryption Access Project

HXC18$5.00