About DESCON ' 18

DesCon 4.0 is the fourth 48-hour annual community and capacity building event focused on the security of The Internet of Things, robotics, electronics, and wearables.

Read more

MAIN VENUE

Impact Hub Belgrade
Makedonska 21
11103 Belgrade
Website
Facebook

Side Venues

Share Square
Koče Popovića 4
11000 Beograd
Website
Facebook

Haklab Beograd
Danicareva 23
11000 Beograd
Website
Facebook


How to participate ?

CFP - Call for Papers - Talk Proposal

Submit your proposal for a talk by Sept 23rd by email to “info at descon.me”. If accepted, you’ll be notified by September 30th.

Possible topics for talks include and are not limited to:

– Information Technology
– Network Security & Cryptography
– Future of IoT
– Hardware hacking
– IoT community networks
– DNS, network identifiers and IoT
– Embedded device / IoT security and innovative attacks and defenses
– IoT environment monitoring Citywide projects
– IoT climate monitoring devices
– IoT climate apps
– Mesh Networks
– Mobile security
– Personal Data & Privacy
– Robotics
– Wearables
– IoT Fashion
– IoT Furniture
– Disrupting policy and society in a constructive way


Pitch your own idea.

If you have something interesting to develop, pitch to the group at the event.

Rather than running a single long hackathon, come along and:

1 – Pitch an idea or project
2 – Work on it
3 – Get it done in a weekend 🙂

This year DesCon focuses on working together to save the Planet

Some of the topics we will be developing:

– Climate monitoring devices
– Climate monitoring software
– Robotics and Wearable Electronics


Join Us

1. Carbon and PM footprint mobile station:

This is a continued initiative of Descon 3.0 and Haklab Belgrade.
We would like to develop a small portable measurement device supported with 4 AAA batteries that all citizens could install in their environment and connect to the Open data network. Security aspect of this device would be an important element.

We have:
– 3 developers
– 10 Arduino nano
– 5 x PM1.0 PM 2.5 and Co2 sensors
– 5 x OpenMote-B Silver Kit
– 5 x 2.4/Sub-Ghz antennas

We are looking for:
– A project co-lead
– Front-end developer
– UX designer
– Back-end developer to set up the server and join the team.

Develop an application showing daily updates of data in your neighbourhood or in your car that is free to download and use.


Join Us

2. Build a 3D printer from scratch in a weekend:

Description: Build a 3D Descon printer from scratch in 48-hours
Capacity: 10 people

What we have (as the team proposing this): motors

We need (to make this happen completely): 6-8 people

We want to make a completely new product that is ready to assemble from scratch. We would like to show how to put it together or how to make a future kit.


Hurry Up!

Conference Schedule

  • Day 1

    Saturday, October 13th




  • Based on Wall Of Sheep idea and "Packet Hacking Village" at the DEF CON conference, a Packet Sniffing Area will be part of this year's event.

  • CTF (short for Capture the Flag) is computer security oriented competition in which solving various of challenges ranging from cryptography, steganography, web vulnerabilities, reverse-engineering, network scanning and sniffing, programming and protocol analysis give participants certain score.

    CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world.


  • During the Capture The Packet Workshop we will explain how packets can be captured/sniffed.

    We will:
    * warn about major risks in wireless setups, protocols, and surfing from free and unsafe wireless networks.
    * Discuss about SSL packets sniffing and cracking (and basics about SSL)
    * Explain "Poor man's VPN" setup as the cheapest solution for safe surfing and call for cooperation on HKLBGD project "VPN_KillSwitch"

    Results of the workshop will be presented in a Wall Of Sheep form (as per DEF CON).

    CTF (short for Capture the Flag) is computer security oriented competition in which solving various of challenges ranging from cryptography, steganography, web vulnerabilities, reverse-engineering, network scanning and sniffing, programming and protocol analysis give participants certain score.

    CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world.

  • Workshop can have max 12 persons. We will provide motors and parts. Put it all together on the second day.

  • Please come and enjoy the first exhibition of Unusual Computers Collective at DesCon.

    UNUSUAL COMPUTERS COLLECTIVE experiments with traditional media to subvert economic roles defined by products; they apply ideas to physical objects that are easy to rebuild, repair, and reuse; they claim our right to the means of communication.

  • Learn about the Constrained Application Protocol (CoAP) by doing. CoAP is a low power stateless alternative to HTTP that includes pub/sub and RESTful caching. Learn to use CoAP for data collection and control using the open source Contiki-NG OS on OpenMote hardware.

    Participants will need:
    - a laptop with either Linux or MacOS, or clueful to run a VM that supports USB
    - a USB port
    - preferably 10G of disk space

  • Cryptoparty is global decentralized movement that aims to bring privacy enthusiast and experts together with ordinary and not so tech savy people with goal of exchanging expirience end knowledge about digital privacy and security.

    Our Cryptoparty workshop will include:

    1. Email encryption:
    - generating gpg keys,
    - exchanging keys,
    - signing trusted keys,
    - exchanging of encrypted and signed mails.

    2. Secure instant messaging:
    - Using Omemo or OTR protocol for end-to-end encrypted chats
    - Installation of XMPP clients
    - Registering account
    - Generating and verifying signatures of contacts
    - Secure messaging

    2.1. Secure messaging platforms:
    - Signal
    - Wire

    3. Secure web browsing:
    - Use of Network encryptions & protections like Tor and VPN
    - Setting up VPN client and securely browsing (discussing possible downsides like Provider's logs, DNS leaks, connection breaks...)
    - Setting up Tor connection and browsing (discussing possible downsides like speed, ... )

    4. Data encryption:
    - Local files encryption with tools like VeraCrypt
    - Full disk encruption mainly on Linux and Android, and Windows and Mac with VeraCrypt
    - Cloud and backup encryption with programs like Cryptomator.

    5. Passwords:
    - Genarating, using and managing good and secure password.
    - Using password managers like KeePass/X/XC.



  • Vlado will present the current status of blockchain based solutions and infrastructure, how this technology could solve problems, various challenges, and what the future is going to bring.

  • Day 2

    Sunday, October 14th




  • During the Capture The Packet Workshop we will explain how packets can be captured/sniffed.

    We will:
    * warn about major risks in wireless setups, protocols, and surfing from free and unsafe wireless networks.
    * Discuss about SSL packets sniffing and cracking (and basics about SSL)
    * Explain "Poor man's VPN" setup as the cheapest solution for safe surfing and call for cooperation on HKLBGD project "VPN_KillSwitch"

    Results of the workshop will be presented in a Wall Of Sheep form (as per DEF CON).

    CTF (short for Capture the Flag) is computer security oriented competition in which solving various of challenges ranging from cryptography, steganography, web vulnerabilities, reverse-engineering, network scanning and sniffing, programming and protocol analysis give participants certain score.

    CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world.

  • SPEAKERS:

    Thomas Levine - "Two recent projects: Privilege separation for old cranks & High performanc bilingual dictionary"

    Hacklab Belgrade - "Decentralization and Decentralized Social Networks"

    Liora Sabot-Cat - "Cybernitca Psychologica: Profiling the Cybersphere"

    Ioana Ciuta - "Operation 'Dust machine': Air pollution in the Balkans - independent monitoring"

    Thomas Levine - "A printing service for hackerspaces"

  • Learn about the Constrained Application Protocol (CoAP) by doing. CoAP is a low power stateless alternative to HTTP that includes pub/sub and RESTful caching. Learn to use CoAP for data collection and control using the open source Contiki-NG OS on OpenMote hardware.

    Participants will need:
    - a laptop with either Linux or MacOS, or clueful to run a VM that supports USB
    - a USB port
    - preferably 10G of disk space


  • Pre Event

    Friday, October 12th

  • https://virteuproject.eu

    We invite tech designers and entrepreneurs to discuss how values and social concerns can be put into practice. The methodology has been previously employed in London, Amsterdam and Copenhagen and is one of the tools developed by the Virt-EU research project.
    Where
    Share Square, Koče Popovića 4

  • This panel will discuss challenges around the adoption of IoT and the role that government can play in helping to achieve the economic potential of IoT and reduce the risks associated with this new technology. Open Trust Alliance is an Internet Society initiative offering various Policy Frameworks to guide actors on how to enhance online trust. We'll discuss how to protect parts of Internet infrastructure and if there is a role for DNS in the future IoT world.
    Where
    Share Square, Koče Popovića 4

  • FRIDAY 12.1O.2O18 2Oh @ ELEKTROPIONIR
    DESCON 2018 OPENING NIGHT featuring:

    NOIZAC LIVE
    MATEJ RUSMIR & ANDRIA B2B SET
    INTRO BY DJ FLIP
    LIGHT DESIGN by INCREDIBLE BOB

    FREE ENTRY for DesCon participants
    Where
    Elektropionir, Cetinjska 15

Guests

What we will provide:

Lovely venue
Big Desks
Snacks and Refreshments
Internet access
Soldering irons, alloy
Shield fabric
Raspberry Pi computers (4)
Application development kits
Application cloud account
Sensors, 3D printer
Sewing machines

You can bring anything else you think you will need!


FAQ's

AWARDS

1st Award – Surprise trip!!
2nd Award – Marshalls Major III Bluetooth headphones
3rd Award – JBL Portable speaker

We will award the most complete or ready to deploy project. Talks and sessions count too.

Jury

Vuk Guberinic: CAR:GO, CEO
Olivia Solis: Share Foundation / Ranking Digital Rights
Nenad Gligorić: DunavNET

Accommodation

The venue is placed in the very center of Belgrade, easy to access with public transport. It will be open throughout the event, 48 hours until Sunday 14th October.
We suggest you book your accommodation through Airbnb or similar.

Contact

If you have any questions before the event, please reach out to info @ descon .me.

Venue

The venue is accessible by public transport and the lower part of the venue is accessible for wheelchair participants.

Food

Free refreshments and coffee and drinks will be provided during the event.
Lunch will be provided on both days, Saturday and Sunday.
Please get in touch at info @ descon .me if you have special dietary needs.