Observe, Hack, Make (OHM)

Observe, Hack, Make. A five day outdoor international camping festival for hackers and makers, and those with an inquisitive mind.

It is a four year tradition in The Netherlands to hold such an event. In the spirit of WTH, HIP and HAR the latest edition, OHM2013, is a non-commercial community run event. The event happens thanks to the volunteers, all 3000 of them. They will run the network, help people around the site, give talks, hold workshops and be excellent to one another.

The target audience includes free-thinkers, philosophers, activists, geeks, scientists, artists, creative minds and a whole bunch of people interested in lots of interesting stuff.

p

Conference information

Location

Geestmerambacht
Koedijk
The Netherlands

Conference program

The conference program can be viewed here.

Articles

Observe, Make, Hack: reflections on a hacker camp

14-08-2014 | Wandering around the paddocks on the first night of camp, the laser lights and smoke in an empty space known as Rainbow Island at the edge of the camp caught my attention.

“A bit sad isn’t it? That huge space, filled with lights and nobody dancing …”, I said. Hacktivist Jason Gulledge paused beside me before answering: “Imagine it as a practice run. We all live in our dreams of what could be.” Read more

My privacy by design talk at OHM 2013

05-08-2014 | This talk is about the possible conflict between getting your message out there, and trying to maintain your site visitor’s privacy. This talk will highlight some of the issues that need to be taken into consideration when building websites for whistleblowers with high security & privacy needs. Read more

NSA power doubles every 4 years – Assange

31-07-2014 | The world is witnessing the creation of a new world order that involves the security state apparatus as an overwhelming force, Julian Assange said during his speech at OHM2013 Observe, Hack, Make conference. Read more

Available videos

Internet in the 90’s

Internet in the 90’s

Project Honeystick

Project Honeystick

Printers gone wild!

Printers gone wild!

Scary internet stuff: Net threats

Scary internet stuff: Net threats

Toying with barcodes

Toying with barcodes

Who are you? An IT Rock Star

Who are you? An IT Rock Star

Rootkits: What they are, and how to find them

Rootkits: What they are, and how to find them

How NOT to Store Passwords!

How NOT to Store Passwords!

Three tips for spotting malware

Three tips for spotting malware

How we take back the Internet

How we take back the Internet

Most popular threats of 2013

Most popular threats of 2013

Do schools kill creativity?

Do schools kill creativity?

Social engineering tricks

Social engineering tricks

Cyber Security Challenge UK

Cyber Security Challenge UK

The great bank robbery: Carbanak

The great bank robbery: Carbanak

Inside your computer

Inside your computer

What does the Internet of Things mean?

What does the Internet of Things mean?

History of the Internet

History of the Internet

Living beyond limits

Living beyond limits

The potential of SixthSense technology

The potential of SixthSense technology

Why good leaders make you feel safe

Why good leaders make you feel safe

Internet of Things changes industries

Internet of Things changes industries

The illustrated story of Facebook

The illustrated story of Facebook

Understand people, understand business

Understand people, understand business

How Google search works

How Google search works

The strangeness of scale at Twitter

The strangeness of scale at Twitter

Street View: Behind the Scenes

Street View: Behind the Scenes

Cyber security 101

Cyber security 101

Risk of a smarter energy future

Risk of a smarter energy future

Looks aren’t everything

Looks aren’t everything

Everyday cybercrime

Everyday cybercrime

Internet Privacy Prank

Internet Privacy Prank

Dos and Don’ts social networks

Dos and Don’ts social networks

How to spot a phishing scam

How to spot a phishing scam

How to pick a proper password

How to pick a proper password

The secret lives of hackers

The secret lives of hackers

The skill of self confidence

The skill of self confidence

Who runs the Internet’s address book?

Who runs the Internet’s address book?

What is Bitcoin?

What is Bitcoin?

Why privacy matters

Why privacy matters

Productivity future vision

Productivity future vision

Building the DEF CON Network

Building the DEF CON Network

Asymmetric Digital Warfare

Asymmetric Digital Warfare

SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

Attacking SMS. It’s no longer your BFF

Attacking SMS. It’s no longer your BFF

28C3: Towards a single secure European cyberspace?

28C3: Towards a single secure European cyberspace?

29C3 GSM: Cell phone network review

29C3 GSM: Cell phone network review

Secure code reviews magic or art? A simplified approach to secure code reviews

Secure code reviews magic or art? A simplified approach to secure code reviews

RFID hacking

RFID hacking

DEF CON 13: Google hacking for penetration testers

DEF CON 13: Google hacking for penetration testers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

NOTACON 3: Network printer hacking

NOTACON 3: Network printer hacking

DeepSec 2010: Debugging GSM

DeepSec 2010: Debugging GSM

OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded)

OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded)

DEF CON 16: Forensics is ONLY for Private Investigators

DEF CON 16: Forensics is ONLY for Private Investigators

DeepSec 2011: The security of non-executable files

DeepSec 2011: The security of non-executable files

DeepSec 2007: Browser hijacking

DeepSec 2007: Browser hijacking

29C3: Russia’s surveillance state

29C3: Russia’s surveillance state

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

ICS Cybersecurity Advanced Training Day 4

ICS Cybersecurity Advanced Training Day 4

24C3: Mifare (Little security, despite obscurity)

24C3: Mifare (Little security, despite obscurity)

OWASP AppSecUSA 2012: Bug bounty programs

OWASP AppSecUSA 2012: Bug bounty programs

DeepSec 2009: Building the next generation IDS engine

DeepSec 2009: Building the next generation IDS engine

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

The tribes we lead

The tribes we lead

29C3: We are all lawmakers!

29C3: We are all lawmakers!

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

SOURCE Boston 2009: Splunk

SOURCE Boston 2009: Splunk

DEF CON 17: MetaPhish

DEF CON 17: MetaPhish

24C3: Cybercrime 2.0

24C3: Cybercrime 2.0

DEF CON 17: Abusing Firefox Addons

DEF CON 17: Abusing Firefox Addons

Introduction to Trusted Computing

Introduction to Trusted Computing

DeepSec 2010: Android reverse engineering and forensics

DeepSec 2010: Android reverse engineering and forensics

25C3: Hacking the iPhone

25C3: Hacking the iPhone

OHM2013: Should law enforcement have hacking powers?

OHM2013: Should law enforcement have hacking powers?

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux

DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux

Hacking WPA2 key: Evil Twin method

Hacking WPA2 key: Evil Twin method

OWASP AppSecUSA 2011: Simplifying threat modelling

OWASP AppSecUSA 2011: Simplifying threat modelling

BruCON 2010: Embedded system hacking and my plot to take over the world 1/4

BruCON 2010: Embedded system hacking and my plot to take over the world 1/4

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DeepSec 2013: Cracking and analysing Apple iCloud protocols

DeepSec 2013: Cracking and analysing Apple iCloud protocols

ShmooCon 2014: ISP’s unauthenticated SOAP service

ShmooCon 2014: ISP’s unauthenticated SOAP service

OHM2013: SIM card exploitation

OHM2013: SIM card exploitation

Cyber Security. Evolved.

Cyber Security. Evolved.

Denial of Service attacks

Denial of Service attacks

2020

2020

Code Stars

Code Stars

Google Zeitgeist: Here’s to 2013

Google Zeitgeist: Here’s to 2013

The athletic power of quadcopters

The athletic power of quadcopters

The difference between leadership and management

The difference between leadership and management

Protect your computer from malware

Protect your computer from malware

Game Over for GameOverZeus?

Game Over for GameOverZeus?

Hackers: the Internet’s immune system

Hackers: the Internet’s immune system

The 1s and 0s behind cyber warfare

The 1s and 0s behind cyber warfare

Phishing scams in plain English

Phishing scams in plain English

Stay Hungry. Stay Foolish.

Stay Hungry. Stay Foolish.

The Black Hole of online crime

The Black Hole of online crime

The importance of cyber security

The importance of cyber security

CyberSecurity changes with Orange

CyberSecurity changes with Orange

Brain: the first PC virus

Brain: the first PC virus

Cybercrime goes mobile

Cybercrime goes mobile

Your body language shapes you

Your body language shapes you

What’s your definition of success?

What’s your definition of success?

Warriors of the Net

Warriors of the Net

How great leaders inspire action

How great leaders inspire action

The “Wizards” of the Silicon Valley

The “Wizards” of the Silicon Valley

Bionics that let us run, climb and dance

Bionics that let us run, climb and dance

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

Embed trojan into a JPG Format

Embed trojan into a JPG Format

Pyrit demonstration (GPU cracking)

Pyrit demonstration (GPU cracking)

DEF CON 17: Making fun of your malware

DEF CON 17: Making fun of your malware

The Honey project and CIC News Engine

The Honey project and CIC News Engine

DeepSec 2013: Uncovering your trails

DeepSec 2013: Uncovering your trails

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

Testing SQL injection with sqlmap

Testing SQL injection with sqlmap

Battery firmware hacking

Battery firmware hacking

Owning bad guys (and mafia) with JavaScript botnets

Owning bad guys (and mafia) with JavaScript botnets

Remote hack on Damn Vulnerable Linux

Remote hack on Damn Vulnerable Linux

27C3: Chip and PIN is Broken (EN)

27C3: Chip and PIN is Broken (EN)

d

Available playlists