Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Defcon 2012 - an inside look

12 of 29 NEXT PREV
  • 001.jpg

     A Defcon attendee shows off a version of a Pony Express bag.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 002.jpg

    The Open Organization of Lockpickers has a strong presence this year.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 003.jpg

    A selection of books for sale.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 004.jpg

    The NSA brought a conversation piece for their table.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 005.jpg

    A Blue Box for sale

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 006.jpg

    Another Blue Box for sale.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 007.jpg

    Defcon shirts.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 008.jpg

    Black Hat, Grey Hat, candy to sweeten the sting.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 009.jpg

    Defcon shirt.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 010.jpg

    Custom engraving and more on the show floor.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 011.jpg

    Outdoor Wi-Fi kits.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 012.jpg

    "Keep Calm and Hack Naked."

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 013.jpg

    Charity hackers.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 014.jpg

    The NSA's signage, on the corner between their table and the EFF's table.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 015.jpg

    The EFF table.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 016.jpg

    Hardware bits and more.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 017.jpg

    Hacker schwag, for those who advertise.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 018.jpg

    Defcon art schwag.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 019.jpg

    For baby hackers.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 020.jpg

    Hubs for sale.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 021.jpg

    Fake iPads for sale.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 022.jpg

    The ACLU's table with anti-NSA handouts.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 023.jpg

    ACLU table staff is having a good time.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 024.jpg

    The back room behind the expo had interesting table centerpieces.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 025.jpg

    Defcon's Lockpick Village was a hands-on learning environment and always busy. It also was where the male-female gender ratio neared 50-50.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 026.jpg

    Lockpick Village staff showing how to escape handcuffs in seconds with a simple shim.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 027.jpg

    Defcon's floor art holds clues for the many crypto puzzles and adventures for attendees.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 028.jpg

    NinjaTel; the mobile cell network for exclusive phones that are actually passes for the most coveted party at Defcon, Ninja Party.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

  • 029.jpg

    An example of Defcon 2012 badges; it's difficult to find the same one twice.

    Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

    Caption by: Violet Blue

12 of 29 NEXT PREV
  • 001.jpg
  • 002.jpg
  • 003.jpg
  • 004.jpg
  • 005.jpg
  • 006.jpg
  • 007.jpg
  • 008.jpg
  • 009.jpg
  • 010.jpg
  • 011.jpg
  • 012.jpg
  • 013.jpg
  • 014.jpg
  • 015.jpg
  • 016.jpg
  • 017.jpg
  • 018.jpg
  • 019.jpg
  • 020.jpg
  • 021.jpg
  • 022.jpg
  • 023.jpg
  • 024.jpg
  • 025.jpg
  • 026.jpg
  • 027.jpg
  • 028.jpg
  • 029.jpg

From Defcon 2012, probably the biggest hacker conferences of the year, we'll take you on a tour of some of the more interesting sights at this year's show. You'll see hacker ware, fake iPads, mysterious machines, schwag and much more.

Read More Read Less

"Keep Calm and Hack Naked."

Published: July 30, 2012 -- 12:24 GMT (05:24 PDT)

Caption by: Violet Blue

12 of 29 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • Who is really in the driver’s seat? Unknown digital threats to your car’s security

    The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk. ...

  • Data leaks: The most common sources

    This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...

  • Facebook's worst privacy scandals and data disasters

    Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • How to avoid being phished during holiday shopping season

    Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...

  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

  • Cybercrime and malware, 2019 predictions

    Experts weigh in on what they believe will happen to the world of cybercrime, malware, and botnets in the coming year.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums