WHY2025

The speaker’s profile picture
-
  • GHP1989 to WHY2025: Dutch hacker camps from the past and the future
The speaker’s profile picture
Aarnav Bos

Aarnav Bos is a Security Engineer at Security Research Labs in Berlin. His focus is on fuzzing, where he conducts fuzzing campaigns on a diverse set of projects and also builds fuzzers. In his free time, he organizes DIY shows, makes music and fire juggles.

  • Autarkie - Instant grammar fuzzing using Rust macros
The speaker’s profile picture
Ad

The #adfluencer (as coined by Nancy). Part of Team:Info, the best team in the universe!
OT nerd during the day, trying to sleep at night. Somehow got tricked into doing a weekly podcast for this awesome event, but loving every minute of it. Also part of the (Dutch) Angry Nerds Podcast.

  • The Only Podcast about a Hacker Camp in the UNIVERSE! WHY?
The speaker’s profile picture
Alain van Hoof

Alain van Hoof is a Linux user since 1993, when XFree86 settings could blow up your VGA monitor. At the age of 42 (yes 42) he became a MSc in System and Network Engineering at the University of Amsterdam. Doing all the Hipster things like CI/CD and Cloud as a consultant he ended up where his heart belongs: in an academic HPC environment where he can do Linux professionally and at scale. At home his Kubernetes cluster in “de meterkast” has an uptime of many years, running a website with 1 visitor a day. Besides the IT, his hobbies include (Islay) whisky, speed skating, running and cycling.

  • Kubernetes from Scratch, The Hard Way
The speaker’s profile picture
Aleksander Parachniewicz

Aleksander is a Technical Enthusiast and Embedded Software Developer.
Aleksander had the opportunity to work in different IT fields, such as web development, Linux systems, and even security printing.

  • How to build and launch a high-altitude balloon project
The speaker’s profile picture
Aleksandra Fedorova

I worked as a Tech Support, SysAdmin, Build, CI Engineer. I learned a lot from the OpenStack community while working in Mirantis as a Release Engineer for the Mirantis OpenStack distribution.

I have been a Fedora Linux community member since Fedora Core 6, and currently I am a member of the Fedora Council.

I work in Red Hat on Fedora, CentOS and RHEL topics. As a member of the RHEL Bootstrap team, I was involved in setting up CentOS Stream 9 distribution, and I currently manage the Installer and Cockpit teams.

  • Elephants, ants and introduction to topology
The speaker’s profile picture
Altf4

I've been a network engineer for 6 years now. I'm also contributing in the NOC at Fosdem and I am a net/sys admin for HSBXL.

I also did a talk about DNS at 38c3 (Here it is : https://media.ccc.de/v/38c3-a-dive-into-dns )

  • The state of IPv6
The speaker’s profile picture
Alyona
  • Weakpass
  • Weakpass
The speaker’s profile picture
Amelia Andersdotter

Amelia has an eclectic career mostly at the intersection of technology, politics and Europe. When backed into a corner, she doubles down. Recently she's been managing risks at a Swedish sovereign cloud service provider, and before that she was moving capital in the chip industry by reorienting standards work to privacy and power save modes. When Amelia was a Member of the European Parliament she got accused of being a communist by a large French telecoms provider, since she has the firm belief that structural separation and vertically disintegrated markets are beneficial for market entry and consumer choice.

  • Green WiFi: how regulation sort of works
The speaker’s profile picture
Argun Cencen

With a PhD in Human-Robot Co-Production and a background that blends hands-on design, digital manufacturing, and systems thinking, I help companies turn complex ideas into real, scalable products. I’ve worked across everything from expedition vehicles to ERP integrations and coffee machines, always trying to connect good design with smart engineering. At PA Consulting, I focus on bridging strategy and execution—making things that work, not just PowerPoints. I’m especially interested in how digital tools and automation can make product development faster, cleaner, and more human.

  • Hacking Perfumery — Design Your Scented Future
The speaker’s profile picture
Arjan Koopen

Teamlead for Team:NOC at WHY2025, founder of EventInfra and member of the board at Bitlair

  • WHY2025 Infrastructure Review
The speaker’s profile picture
Arjan van Hattum

-

  • Postmortem: XS4ALL
The speaker’s profile picture
Arnout 'raboof' Engelen

Arnout (@raboof@merveilles.town) is a NixOS committer, active at Hack42, window manager maintainer, Reproducible Builds advocate, freelance software developer, Security Response @ Apache Software Foundation, and generally living and breathing open source.

  • Bootstrapping a Museum with Open Source
The speaker’s profile picture
Artem Makarov

Artem Makarov is a technology enthusiast. Though his career revolves around software, he never abandoned his hardware engineering roots. He enjoys hobby-level electronics, 3d printing and amateur radio.

  • Hacked in translation: Giving an Abandoned IoT Device a New Life
The speaker’s profile picture
Ayke

I've been interested in electronics and programming as a child. When I later realized I could combine the two in embedded software development, a new world opened up to me.

I've tried many different things: Arduino C, MicroPython, and a bit of embedded Rust. Eventually I ended up writing my own Go compiler for embedded systems: TinyGo.

I like to skip vendor toolchains and BSPs and really understand how bare metal programming works. The chip is all yours, so you can do whatever you feel like - even if this was never the intended purpose.

  • Bare metal programming from the ground up
The speaker’s profile picture
Bastiaan Slee

Technology is great, but understanding at least some parts of it to allow for hacking, is even better :)

Back in 1996, after minutes of loading time with a 14k4 modem, seeing a first website with the Mosaic browser (showing text and inline images), I only wanted to understand what was behind it. Soon after I did had created my own website on De Digitale Stad (DDS). In the years after that, I did grow up with many versions of HTML, CSS, JavaScript, Python, Netscape, Internet Explorer.

Forward to the year 2008, when I got a Nabaztag. An internet connected rabbit that can read out messages or the weather and it could wiggle its ears. Of course I did connect it to my website to show ear-positions and read out visitor messages. Sadly the rabbit was ahead of it's time as there was no Internet of Things hype yet. It went bankrupt and slowly died (for now...).

Somewhere in 2014 I got my introduction to the MCU world: I got my hands on a Raspberry Pi which I used for programming with Python to automate tasks. Soon after, I did run into a Twitter message announcing a Hackster.io contest: The Internet of Voice. This is the real start of my hacking life. My Senseo coffeemaker just broke down and I did buy a new one for the daily caffeine shot. What is better than hacking into the old one and make it voice activated? That is exactly what I did with the help of Amazon Alexa services!

Then Google reached out to provide me early access to their Google AIY Voice HAT. As said, the Nabaztag didn't work anymore, so it was time for surgery; took out its guts and replaced it with a Raspberry Pi, the AIY HAT and a load of LEDs. Now it could be used as a Google Assistant with microphone, speaker, wiggly ears and light. Some years later, I was approached by Electromaker to relive the project with new libraries that Google released. I did upgrade the rabbit with EI (Emotional Intelligence). And you know, the rabbit now seems to be a psychiatrist (or a psychopath?). This was achieved by adding sensors for luminosity, temperature and air quality. Together with some quirky questions, the rabbit could tell you a score of how you feel and play a song that matches your feelings.

On a flea market (Koninginnedag), I bought a 1950 projector for slides. But who still has slides these days? Time again for old tech repurposing! Took out the old stuff and put in an LCD screen (removed the polarizing layers) instead of the slides. I'm now able to play Arduboy games on my wall!

This year for WHY 2025, I did pick up a 1983 CRT TV/Radio Ghettoblaster. Come to the Back to the 80s Village to see what is made of it!

  • Battlesnake workshop
The speaker’s profile picture
Benjamin W. Broersma

Hi there 👋

I'm a hacker, full stack developer, and advisor about internet standards. I like code golf.

  • 🔭 I’m currently working for the Netherlands Standardisation Forum, which facilitates digital cooperation (interoperability) between government organizations and between government, businesses and citizens
  • 🌱 I’m currently learning ZIP, ZLIB (RFC 1950, RFC 1951), ASN.1, ODF and OPC file formats
  • 💬 Ask me anything about EML_NL¹, JQ, bash, xmlstarlet and PL/pgSQL
  • 📫 How to reach me, see my email or 🐦 (@bwbroersma)
  • ⚡ Fun fact: I mail and tweet too many oneliners to colleagues

¹ I used to work for the Electoral Council of the Netherlands (@kiesraad), an electoral management body

  • Race conditions, transactions and free parking
  • How (not) to configure your domainname [internet.nl]
  • How election software can fail
The speaker’s profile picture
bert hubert

Doing DNA, biology, activism, writing, programming. See https://berthub.eu/

  • Reverse Engineering Life: A teardown of the DNA source code of a whole bacterium
  • DNA & Molecular Biology: A 2025 digital view
The speaker’s profile picture
Bix

Bix is a software engineer by day and AV hobbyist whenever the opportunity arises. Organising AV equipment and stages as co-teamlead of Team Productiehuis for SHA2017, MCH2022 and WH2025, member of C3VOC. Usually found backstage at a hacker event near you.

  • Handige microfoon technieken voor betere presentaties
  • Handy microphone techniques for better presentations
The speaker’s profile picture
Boekenwuurm

Boekenwuurm. Purple. Does things for WHY2025. What else?

  • GHP1989 to WHY2025: Dutch hacker camps from the past and the future
  • Closing
  • Opening
The speaker’s profile picture
Brenno de Winter

Brenno de Winter is a distinguished cybersecurity expert, ethical hacker, and thought leader known for his relentless commitment to transparency, accountability, and ethical technology. After years in IT, De Winter transitioned to journalism, where he combined his technical expertise with investigative reporting. His work exposed serious security flaws in government systems, corporate networks, and public infrastructure, driving meaningful change. His reporting was characterized by a clear, accessible style that made complex cybersecurity issues understandable to a broad audience. This approach earned him the title of "Journalist of the Year" in the Netherlands in 2011.

He is the cat-father of OpenKAT, an open-source cybersecurity monitoring solution, and led the initiative of MIAUW (Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde), a structured methodology for penetration testing that has been adopted by organizations seeking to ensure audit-quality security assessments. While MIAUW was his initiative, its development has been a collaborative effort, benefiting from the contributions of other experts in the field.

De Winter is also a respected voice on privacy rights, digital resilience, and regulatory compliance. He regularly speaks on topics such as NIS2, ISO 27001, the GDPR, and the Cyber Resilience Act, offering practical guidance on navigating the complex world of digital regulation. His focus on bridging the gap between technical security measures and organizational governance has made him a sought-after advisor.

Beyond his consultancy work, De Winter remains an active advocate for cybersecurity awareness. He has launched the "Katcast" podcast, where he discusses cybersecurity, privacy, and digital rights, making these critical topics accessible to a broader audience. His passion for teaching and his dedication to ethical technology continue to drive his work, making him a respected figure in the cybersecurity community.

  • From barking to Meow: mature pentesting
  • Integrity violation: toxic workplaces in infosec
The speaker’s profile picture
Carlo Meijer
  • The WHY, the How, the What. An assessment of TETRA End-to-end
The speaker’s profile picture
ChewyMoose

Originally from the US, I packed my bags and moved to the Netherlands in 2016 with my husband. I’ve spent most of my career in healthcare, though I took a little detour for a while before returning to the field—because sometimes life’s got other plans! During the pandemic, I discovered my love for baking and started a small cookie business because who wouldn’t want to make the world sweeter while staying sane? If there’s a beer, whiskey, or food festival, you can bet I’ll be there, probably with a cookie in hand and a smile on my face.

  • The Menopause Gap: How Silence and Stigma Are Putting Women at Risk
The speaker’s profile picture
Christian Paul

Christian loves to develop open source software, attends conferences like FOSDEM and has worked in various startups. For the past 7 years, his professional focus has been on the Matrix protocol but he's had an eye on other open standards like Web of Things and ActivityPub - building integrations and prototype servers for the joy of experimenting. He lives in Berlin and is looking forward meeting some of you at WoT week later this month.

  • Shenanigans with Web of Things
The speaker’s profile picture
Chris van 't Hof

Chris is one of the co-founder of DIVD and Managing Director since 1 January 2022. He entered cyber security through his experience as researcher and wrote two books on Coordinated Vulnerability Disclosure: “Helpful Hackers” (2016) and “Cyberellende was nog nooit zo leuk” (2021). With his unusual background in electrical engineering and sociology, he analyzes how human and electronic networks interact. As presenter he took the stage over 700 times and organized and hosted many talk shows, such as Hack Talk (2017-2022). Combining these experiences and skills he also provides cyber crisis management training to a broad range of organizations. You may say this is not a typical background for a Managing Director, but it works for DIVD. Chris perceives himself not as the boss, but rather a translator who explains to the outside world how hackers can help and aims to provide nerds a safe space to do their thing. At previous camps he was Team Lead Music and radio host.

  • Hack the Grid. Disclosing vulnerabilities to help prevent blackouts
The speaker’s profile picture
cy

cy / Chris is a Software Developer with a long-time SysAdmin background. He is interested in Cloud, Automation and DevSecOps Topics.
He helps organizing at #milliways

  • Automate yourself out of supply chain hell
The speaker’s profile picture
Daan Keuper

Daan Keuper is the head of security research at Computest Security. This division is responsible for advanced security research on commonly used systems and environments.

Daan participated five times in the internationally known Pwn2Own competition by demonstrating zero-day attacks against the iPhone, Zoom and multiple ICS applications. In addition Daan did research on internet connected cars, in which several vulnerabilities were found in cars from the Volkswagen Group.

  • Hacking the Aeotec Smart Hub: The little hub that could
  • Low Energy to High Energy: Hacking nearby EV-chargers over Bluetooth
  • From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface
The speaker’s profile picture
Dana

I live in Germany, North-Rhine-Westfalia, Eifel, and there I work as a:
- Teamtrainer
- Outdoor-Guide
- Trainer for Intuitive Archery
- Systemic Coach.

At the start of 2025, I designed my own website using only HTML and CSS in order for it to be safe for users and customers:
https://wegeweise.de
(If you find any fault, please notify me!)

  • Energizer for brains and bones
  • Energizer for brains and bones
The speaker’s profile picture
Daniels Heincis

Daniels is a cybersecurity specialist with four years of professional experience in the field. His work focuses on developing and delivering technical training for a wide range of audiences, from beginners to professionals. To stay sharp, he actively engages in penetration testing and red team projects. Daniels is also one of the lead organizers of "Mārtiņa-CTF" — one of Latvia’s largest Capture the Flag competitions, known for being beginner-friendly while still offering a solid technical challenge.

  • Time Lord's adventures: abusing time on Linux systems
The speaker’s profile picture
Dany

I'm the one that often yaps about threat modeling and musicals, sometimes combined in the same talk. You might have seen my previous talks at WICCON, HackerHotel or PancakesCon. I move in social circles where consent negotiations for interpersonal connections are a common, even between long-time partners, some of the lessons I've learned there I want to share with the hacker community.

Because mortgages need to be paid and theatre tickets don't buy themselves I have a day job as security consultant doing DevSecOps, threat modeling, and GRC things. Which means as much as that I read and write slidedecks, click on links in e-mails, and happily take on the role of corporate jester for money. At WHY2025 I'm the lead of Team:Cohesion and heavily involved with all things Code of Conduct and consent. You can also find me in the WICCA&WICCON orga.

  • Consent for Hackers, How to negotiate consent based on HTTP status codes
The speaker’s profile picture
Darcy Neal

Darcy is a new media artist, cyborg, maker, and educator with a background in sculpture, electronics, and experimental music. They create unique audio and visual instruments and design innovative machines that invoke new ways of interacting with our world. As a teaching artist, Darcy has been actively involved in conducting electronics workshops, focusing on electronic design and experimental circuitry. Their workshops are shared in hackerspaces, tech conferences, and universities across the world.

  • Sensing the World Around you with EMF!
The speaker’s profile picture
Dario Mas

Dario Mas

  • Summoning Shenron: Building the Cyber Saiyan Badge
The speaker’s profile picture
Dave Borghuis

Longtime hacker camping volunteer (since HIP 1997)
Organised Dutch demoparty "Outline" in 2024
Founder hackerspace TkkrLab, Enschede/NL
Webmaster of https://mapall.space (Liveview of all open hackerspaces worldwide)
Active in the demoscene under name "zeno4ever", mainly TIC-80 related byte jams/demos

Mastodon : @zeno4ever@mastodon.social
Email : dave [at] daveborghuis [dot] nl

  • TIC-80 workshop & introduction demoscene
  • TIC-80 byte jam
The speaker’s profile picture
Davide Pala

Vice President of Cyber Saiyan. Cyber Saiyan is a non profit organization founded in December 2017. We organize RomHack cybersecurity Conference since 2018 and we extended the RomHack format with a Hacker Camp in 2022 and Training in 2023

  • The shadow of Operational technologies: A journey into the OT security
The speaker’s profile picture
Dina Tuinhof

Linguist since 2003
Happy hacker since HAR
Teacher Dutch as a second language since 2020

  • Dutch fun! (damentals)
The speaker’s profile picture
Dirk Maij

With over 25 years of professional IT experience, 20 of which in the field of cybersecurity, Dirk knows his stuff. Being slightly neurodiverse, Dirk build up a vast knowledge in all fields of cybersecurity, ranging from pentesting to threat hunting to awareness to compliance to OT and even rockets. Dirk always returns to the community in the form of input to various projects, but also providing training to transfer his knowledge.

  • Crypto(graphy) 101
The speaker’s profile picture
DoodleMe

@DoodleMe is a software engineer at FetLife, based in Belgium.

They’re part of the RopeLabs village, creating welcoming spaces to explore Shibari through hands-on workshops and jams.

Passionate about queer-friendly kink education and peer-led learning.

  • Rope Jam
  • Shibari 101 - Rope Bondage for Beginners
  • Shibari 102 - Rope Bondage for Beginners
The speaker’s profile picture
Elger "Stitch" Jonker

Chair of the Internet Cleanup Foundation and initiator of the basisbeveiliging.nl and basistoegankelijk.nl projects. With over a decade of security expertise and many more years in software developement, Elger tries to change the world for the better. Elger is very active in the ethical hacker scene. Founding Hack42 and Awesome Space and chair for the last two Dutch hacker camps/conferences: SHA2017 and MCH2022. #okboomer

  • How we made the Netherlands more secure and accessible using transparency
  • Evolution and history of 35 years of hardcore/gabber music [XXL edition]
The speaker’s profile picture
Eloy

Retro tech hacker

  • Hacker Jeopardy - Round 2
  • Hacker Jeopardy - Final
  • Hacker Jeopardy - Round 1
The speaker’s profile picture
Erik Meerburg

Erik Meerburg has been working in geo-information for over 25 years. About a third of his career he’s worked in governmental organizations, a third in businesses, and a third as a self-employed professional and trainer. Education in geo-information and promotion of the use of geo are his main focus, with a strong focus on FOSS for the last 15 years. Erik’s a charter member for OSGeo, secretary of the Dutch Chapter OSGeoNL, co-founder of the QGIS User Group in the Netherlands, and main organizer for the Dutch FOSS4GNL events. Apart from his love for geo, he also plays Double Bass in folksy, bluegrass and old-time music.

  • Bass: because we need more ethical players
The speaker’s profile picture
Fleur Van Leusden

I've made it my mission to make infosec leadership knowledge and experience available to everyone.

That is why I write a paywall-free column monthly and run a podcast that is free of sponsorships, commercials or paid memberships about infosec leadership. I also work as a CISO for a Dutch government organisation.

This talk is a co-talk with none other than the man, the legend, Lord Mendel Mobach/Bug Blue.

"Cryptohalfgod"
"Opensource plunderer"
"known from http://nu.nl"

  • Guerrilla Security Awareness Done Right; Hacking Your CISO's Phishing Simulation
The speaker’s profile picture
floort

Data protection consultant and one of the initiators of the Dutch Coordinated Vulnerability Disclosure policy adopted by the national government and many other organisations. I try to create a safe environment for hackers to publicly disclose the vulnerabilities they find.

  • Reporting vulnerabilities in Belgium
The speaker’s profile picture
Florence Mooser
  • Building Inclusive Quantum Communities
The speaker’s profile picture
Francis Duvivier

I'm Francis,
I'm a FullStack Developer and Badge Enthousiast.

  • All about BadgeHub
The speaker’s profile picture
François GRANIER

I am a web penetration tester specialized in web intrusion testing, cyber exposure, and attack surface management. My expertise lies particularly in the client-side aspects of web security, focusing on browser behavior and browser fingerprinting—an area I am passionate about. I approach browser fingerprinting from an anti-bot and preventive perspective, aiming to identify user behaviors that indicate potential malicious activity. I enjoy collecting and correlating data to automate my processes as much as possible, enhancing both efficiency and detection capabilities.

  • Stealth Web Scraping Techniques for OSINT
The speaker’s profile picture
Frank Breedijk

Father, husband, balloon folding clown, fire breathing amateure, CISO at Schuberg Philis, Crisis manager at DIVD, inforsec dinosaur, once upon a time author of Seccubus, starting bee keeper and jack of all trades and tinkers with telexes.

Avoid the topics of balloon folding, fire breathing and my 18th cengtury farmhouse if you don;t want me to waist your time ;)

  • Balloon folding for kids
  • Nerding out over silly machines
  • Scaling up victim notification, because crededential theft is scaling up too...
  • Frank talks AI, keynote style
  • Balloon folding for adults
The speaker’s profile picture
Frans Boeijen

Frans has over 30 years of experience in quality management in IT. He was responsible for the introduction and validation of several automated systems in pharmaceutical companies. Frans is a self-employed professional trainer in validation of IT-systems, data integrity and data quality.
He has given various lectures and workshops at international conferences around the world.
Frans is very interested in using IT safely in life sciences. And he is also very interested in old and early techniques used in automation.

  • Is a 1973 Pinball Machine a Computer?
The speaker’s profile picture
Frans Faase

I am a senior software engineer with an interest in compilers.

  • Reviewing live-bootstrap
The speaker’s profile picture
Fraxinas

Andreas, known as "Fraxinas" in the FOSS community, holds a degree in electrical engineering and information technology from the University of Applied Sciences in Aschaffenburg. He specializes in Rust, GStreamer and Embedded Linux. A regular speaker at conferences worldwide, he has also contributed to fostering a culture of repair and sustainability as the founder of multiple Repair Cafés. For eight years, he was a familiar face on German television as the "Repairfox" in ARD Buffet.
Passionately tinkering in the Schaffenburg Hacker/Makerspace. LGBT Youth activist, furry, musician, mountain biker and Japanese learner.

  • Repair for Future
The speaker’s profile picture
fukami

fukami works as Head of the Brussels Office for CrabNebula. His main focus is on the implementation of the Cyber Resilience Act (CRA) and his role as rapporteur at STAN4CR2 -- an EU project co-funded by the European Union and EFTA to support the development of harmonized European standards for the CRA.

  • Developing harmonized CRA standards
The speaker’s profile picture
Gaspard Bos

Co-founded Better Future Factory while graduating as an Industrial Designer from TU Delft. Went on as New State of Matter exploring the digital systems of control that govern our extractivist economies. Got into AI in 2016 when generating realistic human faces was mindblowing and took about one day on a fat GPU. Because of his experience in education as a side-gig decided to become an AI researcher/advisor for Kennisnet.

  • Hacking Perfumery — Design Your Scented Future
The speaker’s profile picture
Geert-Jan

Geert-Jan works as a freelance network designer, mainly for large enterprises and telco’s. He dedicates his spare time to restore sovereignty and freedom in the digital domain. He is one of the initiators of ‘The Coalition for Fair Digital Education’ (in Dutch: CEDO) – (this collation in not related to any political party). See eerlijkdigitaalonderwijs.nl

Geert-Jan is also coordinator of the Pirate party of Delft that works together with student-party STIP - the largest coalition party in Delft. Their goal is to make sure that Delft switches to open source and privacy-by-design solutions and publishes all non-private data as open data. See ibestuur.nl/nieuws/delftse-principes-voor-digitale-soevereiniteit

  • Digital sovereignty and the FOSS-stack at school.
The speaker’s profile picture
Guendalina
  • The Roomba Rebellion: Turning Cleaning Bots into Insider Threats
The speaker’s profile picture
Harald Koenig

I studied physics and started with Linux (kernel 0.98.4) in 1992 (UNIX since 1987), XFree86 (S3 cards) since 1993, using and working on (La)TeX since 1987 and co-founded the german TeX users group DANTE e.V. I've given talks on several german FOSS/Linux conferences, and some project specific meetings (OpenMoko, smart meters, OpenStreetMap, TeX) for many years. Today I'm working for Bosch Sensortec GmbH, writing device drivers (uC and Android/Linux) and CI infrastructure and testing/support code for upcoming hardware.

  • Getting Started: Reading Bosch Sensor Data on the Badge with MicroPython
The speaker’s profile picture
Harmen Zijp

Harmen Zijp has a background in science and arts. He works as an independent artist, researcher and organiser of various grass roots initiatives. These range from public facilities for open innovation and culture to investigative journalism and tools for democratic decision making.

  • Solar Sailing Serendiep
The speaker’s profile picture
Henrik Schönemann

Pronouns: he/him

Initiated @SafeguardingResearch on Jan 15th, 2025.
"No Musk can shut us down."

(Digital) Historian based in Berlin (Humboldt-University);
just doing #DigitalHumanities / #DigitalHistory things.
Toots in German/English.

"Sharing isn’t immoral — it’s a moral imperative."
Aaron Swartz, Guerrilla Open Access Manifesto, 2008.
https://openbehavioralscience.org/manifesto/

  • Safeguarding Research & Culture: Save public data from the digital bookburnings!
The speaker’s profile picture
Honghong Lu

Consulting in electronic prototyping & small volume production. Skilled in soldering, 3D printing, exploring laser engraving and skilled in sewing—especially handmade retro fabric bags.

  • BlinkyTile Soldering Workshop
The speaker’s profile picture
Hugo Trippaers
  • Robotics Hello World, a.k.a build your own hexapod
The speaker’s profile picture
Iceman

Christian Herrmann, better known throughout the hacker community as “Iceman”, is a co-founder of AuroaSec, RRG and helped produce many of the most common RFID research tools available today including the Proxmark3 RDV4, and Chameleon Mini. He is an RFID hacking and Proxmark3 evangelist, serving the RFID community as both forum administrator and major code-contributor alongside other community developers since 2013. He has spoken at hacker conferences around the world including Troopers, Black Hat Asia, DEF CON, SSTIC, NullCon, Pass-the-Salt, BlackAlps and SaintCon
He also have a youtube channel where he talks about RFID hacking to the public.

He has provided bespoke software development services for over 14 years specializing in .NET platforms, and is a Certified MCPD Enterprise Architect.

Christian Hermann has nearly unmatched knowledge of Proxmark3 architecture and a variety of RFID technologies, and was an instructor for the Red Team Alliance (RTA) during which also included Black Hat trainings.

  • Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
The speaker’s profile picture
Inbar Raz

Inbar has been teaching and lecturing about Internet Security and Reverse Engineering for nearly as long as he has been doing that himself. He started programming at the age of 9 and Reverse Engineering at the age of 14. He spent most of his career in the Internet and Data Security field, and the only reason he's not in jail right now is because he chose the right side of the law at an early age.

Inbar specializes in an outside-the-box approach to analyzing security and finding vulnerabilities, using his extensive experience of close to 30 years. Nowadays, Inbar is the VP of Research at Zenity, the leading platform for securing Business-led Development with GenAI, AI Agents, and Low-Code/No-Code development.

  • 0click Enterprise compromise – thank you, AI!
The speaker’s profile picture
Indivisual

I am a neuroscientist by training, a writer, a passionate professional, a psychonaut, a skilled conversationalist, female, tall, loud, happy,..this list goes on. I continually am in search for balance, for likemindedness, for inspiration, for kindness, and for home. I love to dance, I admire those who make me want to listen, and I never shy away from a challenge - of you or of myself. Nice to meet you :)

  • The Neuroscience of Psychedelics
The speaker’s profile picture
iron

I finish almost all of my projects, and I make a lot of mate ice tea.

  • Creating mate ice-tea
The speaker’s profile picture
Isabel Barberá

Isabel Barberá is a recognized expert in AI privacy, security, and risk management. She contributes to the development of the upcoming European standards on AI risk management and AI cybersecurity at CEN/CENELEC. Isabel is the author of the open-source tool for AI threat modeling PLOT4AI, first released in 2022 and updated in May 2025 as PLOT4AI 2.0.

  • PLOT4AI 2.0: Open source Threat Modeling for Trustworthy AI
The speaker’s profile picture
Isabella Whelan

Someone who is a little but too interested in the in workings of hardware

  • Sega Saturn Architectural hell
The speaker’s profile picture
Iván Ávalos

Software engineer, Master's student @ BFH, working in GNU Taler.

Advancing free software is my life mission.

  • GNU Taler: beyond digital money
The speaker’s profile picture
Jacco Ligthart

I got my start in IT security back in the summer of 2003 - just a few days in, I wrote my first security advisory for the Dutch government. Fast forward 22 years and a whole bunch of security projects later, I’m now the product owner of the vulnerability team at NCSC-NL. In this talk, I’ll share how our security advisory service at NCSC-NL got off the ground, how it’s evolved over the years, and where we’re heading next.

  • 23 Years of Security Advisories: Past, Present, and Future at the Dutch NCSC
The speaker’s profile picture
Jamie Zwart

Jamie is a senior security specialist with over seven years of experience in the offensive security field. At Secura, he performs social engineering attacks, is involved in post exploitation in red team assessments, and performs infrastructure assessments. With his roots in embedded devices, he also has extensive experience with assessing applications and IoT devices.

  • The Roomba Rebellion: Turning Cleaning Bots into Insider Threats
The speaker’s profile picture
Jan Ainali

Jan is an advocate for openness and collaboration. He is running the company Open By Default where he helps other organizations on their journey to becoming more open. He has a history of working with open source at the Foundation for Public Code, open knowledge at and with Wikimedia and open data at Creative Commons.

  • Why Proprietary Tooling Hurts Your FOSS Project
The speaker’s profile picture
Jan De Coster

With over 28 years of experience in storytelling, design, and strategic communication, I specialize in
crafting immersive experiences that engage and inspire diverse audiences. My career spans work with
major brands in advertising, interactive installations, and, more important, advocacy campaigns for environmental and social causes.
I have a strong background in user experience, exhibit design, and digital storytelling, creating meaningful interactions that connect people with nature, culture, and innovation. My expertise in stakeholder collaboration and audience engagement allows me to design experiences that are educational, emotionally resonant and very effective.

  • How we stopped a € 50 million project from destroying a forest (and other ways to pick fights with corporations and governments)
The speaker’s profile picture
Jan Tiri

Hybrid Cloud Services Architect @ Johnson & Johnson - jenkins - ci/cd - terraform - aws - azure - gcp - CoderDojo (lead @Westerlo - coach @Geel) - linux - arduino - IoT - hamradio (on4tux) - home assistant - mqtt - esp - micropython - makeblock - raspberry

  • Coderdojo Robotics @WHY2025
The speaker’s profile picture
Jasper

My background is in IT and cybersecurity, I played CTF competitions internationally and worked as a cybersecurity specialist/consultant.

I am closely involved in building the Challenge the Cyber foundation to what it is today: A year round programme with a national CTF competition, workshops, the cyberbootcamp and selection of the Dutch national team and playing the European Cybersecurity Challenge (ECSC). See https://challengethecyber.nl for more information.

Today, as a freelancer, I follow my passion and develop technology and IT to raise experiences to a whole new level. For example, I make experiences (think escape rooms, Halloween, shows, events, film, museums) more immersive and interactive by combining IT with creativity. I build custom show control. And I optimize time and costs for operations and production by using IT and applying structure. See https://linkedin.com/in/jasper-boot for more information about me and my projects.

  • Challenge the Cyber
The speaker’s profile picture
Jay9

Simon Klose is an award-winning director and producer from Sweden with several documentaries on the topics of technology and social issues. His strong cinematography turns this real-life story into a suspenseful watch.

  • Documentary screening: Hacking Hate (2024)
The speaker’s profile picture
Jay Jayesingha
  • Building Inclusive Quantum Communities
The speaker’s profile picture
Jean-Michel Friedt

Jean-Michel Friedt is associate professor at the University of Franche-Comté in Besançon, France with his research activity hosted by the Time & Frequency department of the FEMTO-ST institute. His interests include the use of digital electronics in stable time and frequency signal generation and dissemination, including Global Navigation Satellite Signals and RADAR processing. He is the co-author of the book "Communication Systems Engineering with GNU Radio: A Hands-on Approach" including a detailed description of software defined radio RADARs.

  • Passive and active RADAR using Software Defined Radio
The speaker’s profile picture
Jelle Niemantsverdriet

Serial security paradigm breaker with deep roots in incident response and breach investigations. After leading security teams at Microsoft, Deloitte, Verizon, and Fox-IT, Jelle's on a mission to break down the traditional "department of NO" and build security that works with humans.

He combines behavioural science, safety engineering, and AI insights to build security that actually makes sense. Think less compliance checkboxes, more organisational resilience.

Known for bringing fresh perspectives through non-traditional conference talks, Jelle bridges technical expertise (MSc AI, CISSP) with business strategy (Chicago Booth MBA) to reimagine how we approach security challenges.

  • ❤️ Failure - Unbreakable security by breaking things
The speaker’s profile picture
Jeroen Hermans

Jeroen is a technical consultant with a background in electrical engineering and security. He started his consultancy business "CloudAware" located in The Hague in 2002. His consultancy business has been active in a wide spectrum of technologies ranging from signal intelligence to cloud services.
In the last couple of years CloudAware has been particularly active in the field of cyber security.
Jeroen publishes regularly on the blog of CloudAware: https://cloudaware.eu

  • Die Hardcoded: Unlocking Yealink's (weakest) secrets
  • Knock knock who's there 2.0, the subtle art of (physical) port knocking
The speaker’s profile picture
Jesus Zen Droïd

Polypolar maker and sort-of artist, founder of the hackerspace engrenage in La Chaux-de-Fonds. Loves fluid- and thermodynamics, but spends quite a fair amount of time trying to figure out why the Universe is not quite working as it's supposed to (this includes computers) ; in doing so he learns to master all sort of skills (language design, electronics, welding, carpentry, machining, sleeping, etc.) because he feels that otherwise his brain-antenna might implode or something. Can barely touch a touch without pimping it one way or another.

  • A step towards infinite storage?
The speaker’s profile picture
Joannis Orlandos

Joannis is a full-time OpenSource maintainer as part of the Swift OpenSource project. He's been leading various Swift on Linux projects including the Vapor and Hummingbird Web Frameworks.

You'll typically find him working on networking libraries or Swift frameworks.

  • Accelerating IoT and Robotics Development with Swift
The speaker’s profile picture
John Volock

John spends his day leading product security over a medical device business unit at Medtronic. He has spent his career across various parts of the Safety Critical Industry: Planes, Trains, Automobiles, Industrial Controls and Medical. DevOps, Firmware, Software or Systems, he's done it. His general approach is trying to take a holistic view of a system, then drilling down deep into the technical weeds. Having health issues himself, he likes to address issues regarding patient perspective, in addition to the traditional views from HDOs, MDMs, and Regulators.

In his spare time, he likes to pick locks and break things. Assumptions, edge cases, and thinking through system failure, is his happy place. Always looking for the next puzzle, and ways to move things forward.

  • Democratizing Healthcare: Open Source Medical Devices
The speaker’s profile picture
joohoi

joohoi is a seasoned hacker with over two decades of experience in the fields of software development and information security. He is recognized for his significant contributions to the open-source community, notably his work on acme-dns, ffuf, and certbot.

  • Flipping Bits: Your Credentials Are Certainly Mine
The speaker’s profile picture
Joram Agten

Software Engineer @Vito Satellite/Plane/Drone image processing, calibration
Coderdojo Belgium (lead @Geel, coach @Meerhout, coach @Westerlo, board member)
running enthusiast, woodworker, gardener
badgelife - linux - arduino - esp32 - micropython - hamradio (on8en) - home assistant - makeblock - raspberry

  • Badge Fun for Young Coders!
The speaker’s profile picture
Josie

Josie hacks on infrastructure, dev experience, and whatever else needs fixing. She’s done platform engineering, DevOps, SRE, and tech management across startups, SMEs, and massive enterprises-mostly making things faster, more reliable, and less painful for developers.

Wherever possible, she enjoys getting into the open-source trenches, contributing to archlinux, and kubernetes-adjacent projects like backstage and kube-burner.

  • 9001 ways to break out of a container
The speaker’s profile picture
Jos Visser

Here’s a concise and professional conference biography based on the information you provided:

Josephus C. Visser is a seasoned software and systems engineer with over 35 years of experience, including leadership roles at Google, Amazon, Meta, and OpenAI. He specializes in building highly reliable, distributed systems at scale, and has led global engineering and SRE teams supporting mission-critical infrastructure.

His work spans everything from AI supercomputing platforms to human-scale onboarding systems and internet-scale continuous deployment. Josephus is also an experienced technical speaker, educator, and mentor, having delivered keynotes and talks at SRECon, MCH, and internal leadership programs at Google and Meta. He holds degrees in both computer science and law, and writes a weekly newsletter and podcast titled Wednesday Wisdom.

Currently, he works at OpenAI as a Research Platform Engineer and holds dual US/EU citizenship.

Would you like a shorter version for a speaker badge or emcee introduction as well?

  • The GDPR for beginners
The speaker’s profile picture
Juergen Pabel

IT-Security-Management guy at day, hacker/maker at night.

  • Retrospective: Adventures with CircuitPython
  • ISMS-oxide and you (Information-Security-Management-System for hackers)
The speaker’s profile picture
kantorkel

kantorkel discovered

  • his biometric data in a US face search engine,
  • US DoD biometric devices on eBay and
  • that Fraunhofer has millions of photos from the BKA's (German Federal Criminal Police) police information system.

He runs Tor exit nodes and accidentally stumbled into a large fake shop network.

  • A Journey Through Boring Telco Data Leaks
The speaker’s profile picture
Kirils Solovjovs

Kirils Solovjovs is Latvia's leading white-hat hacker and IT policy activist, known for uncovering and responsibly disclosing critical security vulnerabilities in national and international systems. An expert in penetration testing, network flow analysis, and reverse engineering, he is also a lifelong command-line enthusiast. Kirils started programming at age 7 and by grade 9 was spending his lunch breaks writing machine code directly in a hex editor. He uses bash daily for hacking, automation, and large-scale data processing and is sometimes contracted by major online education providers to proofread their bash certification exams. He currently is the lead researcher at Possible Security.

  • So you're interested in social engineering? The very first steps
  • Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
  • A Big Bad App: Welcome to Corporatocracy
The speaker’s profile picture
KnottyLola
  • Rope Jam
  • Shibari 101 - Rope Bondage for Beginners
  • Shibari 102 - Rope Bondage for Beginners
The speaker’s profile picture
Koen Groenland

Koen Groenland is a theoretical physicist with a PhD in the near-term applications of quantum computers. He works as an innovation officer at QuSoft and the University of Amsterdam, where he is responsible for growing an active 'ecosystem' around quantum technology. His key interests include practical use-cases of quantum computers and the quantum impact on cybersecurity. Koen authored the book 'Introduction to Quantum Computing for Business', which can be accessed for free at www.introtoquantum.org.

  • Quantum computers: the ultimate hacking machines
The speaker’s profile picture
Kseniia Ignatovych

A seasoned cybersecurity professional currently serving as Senior Security Product Manager at Elastic Security. With a Master's degree in Information Security and holding the prestigious CISSP certification since 2017, Kseniia brings deep expertise to the field of information security.
Kseniia specializes in several critical areas of cybersecurity: Security Operations (SecOps), Detection Engineering, Threat Intelligence, Security Development.
Beyond her technical expertise, Kseniia is passionate about making the tech industry more inclusive and accessible. She serves as an advocate for neurodiversity in tech, a champion for accessibility initiatives and an active community builder through meetup organization.
Through her work and advocacy, Kseniia demonstrates a commitment to both technical excellence and creating a more inclusive technology sector.

  • CyberSecurity Rant - a safe space to talk about what annoys you in cybersecurity
  • Detect threats like never before
The speaker’s profile picture
Lexander

Hello! I'm a 23 year old computer science student who loves combining creativity with code (such as FreeSewing!) I'm also active as a socialist. Ask me for free stickers!

  • FreeSewing: sewing patterns in the open source world
The speaker’s profile picture
Logan Williams

I'm Logan, a technologist, journalist, birdwatcher and data artist from Oregon via Amsterdam. I like to look closely at nature, and in my art practice I explore the ways that technology mediates and augments human observation. I am also the Technology Officer for Bellingcat, a non-profit journalism NGO that develops open source methods for investigative journalism. There, I build tools for journalists to investigate and document war crimes, endangered species trafficking, and online extremism. Also ask me about: ecological data sources, computational photography, sonification, bird migration, D3.js, mothing, and what happens when you leave a Raspberry Pi in a creek for a year.

  • Is AI for the birds? The beauty of backyard birdsong data
  • Eye on the sky: building investigative journalism tools for analyzing airplanes
The speaker’s profile picture
madonius

Hacks, Cycles, Loves music

  • WHY and how would somebody cycle over 500km to a hacker conference?
The speaker’s profile picture
Maja

asdfasdf komt nog

  • Challenge the Cyber
The speaker’s profile picture
Marina Bochenkova

Marina Bochenkova wears many hats as a cybersecurity analyst focusing on digital forensics, incident response, and OT security, while also dabbling in security awareness and culture. She combines a passion for protecting people, a strong belief in digital privacy as a human right, and an overly-enthusiastic approach to problem-solving. When not defending digital spaces, Marina actively nurtures her already-unhealthy obsession with cats and resorts to baking or martial arts when desperate.

  • CyberSecurity Rant - a safe space to talk about what annoys you in cybersecurity
  • TTP’s 4 TTP – Tactics, Techniques, and Procedures for Talking To People
The speaker’s profile picture
Mark Janssen

Self-employed, currently lead developer and software architect for Abacus at the Dutch Electoral Council (Kiesraad).

  • Abacus: Open source software for the Dutch Elections
The speaker’s profile picture
mark seiden

Mark has been programming since the 1960s. High points of career at Bell Labs, IBM Research, Xerox PARC, Lucasfilm, now at Internet Archive, recently teaching at UC Berkeley and Columbia. He's been an expert in more than 50 civil and criminal cases. Am always looking to teach, advise and help with security (writ large), trust and abuse. (His Erdos number is 3; Other interests: food, wine, piano).

  • Caveat Emptor: Ratings and Reviews Can't Be Trusted
The speaker’s profile picture
Martin Hamilton

I'm a freelance computer and Internet consultant, greybeard variety. My claim to fame is that I'm accidentally responsible for RFC2219/BCP17 which formalised the use of the "www." convention for website domain names. I'm very sorry, and I promise it won't happen again.

At WHY I'm interested in speaking with people about decentralization of key Internet capabilities like search, so that we aren't beholden to billionaires and our privacy isn't sold to the highest bidder. I'm particularly interested in workable approaches to search in the AI slop era. If this interests you too, consider joining SearchClub, where a few of us are thinking big thoughts about this.

I'll probably have my LED hat and my CYBER bag with me at WHY, so if you see someone who glows in the dark it could well be me - do say hello! You can also find me on teh Interwebs at https://martinh.net and my fedi handle is @m@martinh.net.

  • The Well Is Poisoned — Now What Shall We Drink?
The speaker’s profile picture
Matthew Mets

Director of Blinkinlabs, Matt is a maker who uses electronics to create playful objects that teach and inspire. An electrical engineer by training, he’s been at various times an RF engineer, embedded systems architect, writer, and exhibit designer.

  • BlinkyTile Soldering Workshop
The speaker’s profile picture
Matthijs Melissen

Matthijs Melissen has been working at Computest Security for 10 years: First as a Security Specialist and Ethical Hacker, later as the Technical Lead of the Pentesting team. Prior to his role at Computest Security, he has been working as a PHP developer, as well as as an academic researcher in IT security. He received a PhD from the University of Luxembourg based on his research in fair exchange protocols.

  • Pentesting Passkeys
The speaker’s profile picture
Mattsi

I'm Mattsi, a software engineer / consultant / craftsman / tell-computers-what-to-do-guy. I have a personal tech blog over at www.matt.si

I'm a polygot and use a wide variety of tech in my day work. In my personal projects I've mostly been sticking to Rust for the past few years. I founded a Rust study group and have done some conference/meetup talks and workshops about the language too, including running a day-long Rust workshop at the UK's first Rust conference.

Other interests:

  • ethics in tech
  • digitalrights
  • chess (I'm writing my own chess engine! https://github.com/Mattsi-Jansky/Iroh)
  • AI, more search & logic AI than machine learning
  • Simulations and gamedev
  • Tech meetups, conferences, hack camps
  • Animation, anime
  • videogames, particularly RPGs
  • Writin' me a RUST
The speaker’s profile picture
Meinte Boersma

Meinte has been helping various organizations with building and deploying model-driven solutions ever since he was bitten by the “meta-bug” in 2007. His book “Building User-Friendly DSLs” (Manning Publications) was published October 2024. Currently, he’s implementing a DSL for controlling industrial lasers. Earlier, he’s worked for the Dutch ministry of health on opening up and regulating travel during the COVID-19 pandemic using certificates. He’s also a co-founder of the LionWeb initiative for interoperable language-oriented modeling tools.

  • How to make a Domain-Specific Language for non-devs (so they don't need AI)
The speaker’s profile picture
Merlos

I’m Giovanni "merlos" Mellini one of the founders - and actual president - of Cyber Saiyan, a non profit organization born in December 2017 - https://www.cybersaiyan.it/
Since 2018 we organize RomHack a cyber security conference held yearly in Rome, Italy - https://romhack.io/ and in 2022 we organized RomHack Camp.

I occasionally speak on public community events, schools and universities

  • My journey into cloud security
  • Summoning Shenron: Building the Cyber Saiyan Badge
The speaker’s profile picture
Mia

Mia is a software developer by day and a PhD candidate in the history of mathematics by night. She thrives on combining hands-on coding with historical sleuthing, considers her craft the coolest gig on earth and believes early modern engineers rocked.

  • Flattening the Curve: Rediscovering Web UI Through Historic Geometric Constructions
The speaker’s profile picture
Mike Wessling (Area42)

A nerd, a tinkerer, and an artist. Besides a long career in IT, climbing the OSI stack from network engineer up to architect and management (or sliding down, depending on your perspective), Mike spends his time in his workshop tinkering and helping others realize their creative dreams with practical engineering support. The artist emerged after a visit to Burning Man in 2006, where he met fellow nerds creating their art, especially the amazing fire installations. In 2013, the first flamethrower was built for OHM2013, and he has been building bigger and better installations ever since, including Flamehenge for MCH2022.

  • Workshop Flamethrower 101
  • Workshop Flamethrower 101
The speaker’s profile picture
Miriam Bastian

Miriam is program manager at the Free Software Foundation (FSF). Prior to coming to the FSF, Miriam completed her PhD in ancient history at the University of Zurich and worked as a freelance journalist and teacher. Miriam loves being in nature, playing TTRPGs, mountains, vegan food, and good coffee.

  • Free software education - Let's get practical
The speaker’s profile picture
Mischa Rick van Geelen

Hi! I’m Mischa Rick van Geelen, founder of Anovum B.V., a leading cybersecurity company. I have investigated and resolved large-scale cyber incidents, including the attacks on Hof van Twente and ROC Mondriaan (publicly documented), and have been involved in numerous anonymous incidents. Additionally, I conducted the penetration test on the CoronaMelder app, with the results submitted to the Dutch Parliament, and I actively contribute to the development of the MIAUW methodology.

As a security consultant, incident responder, and digital forensic investigator, I help organizations strengthen their IT security, investigate incidents, and resolve issues. My expertise includes secure software development, network security, and the implementation of EDR/XDR solutions. I also provide workshops and lectures to enhance cybersecurity awareness.

  • From barking to Meow: mature pentesting
  • Synology Disk Station Manager (DSM) Forensic Recovery Methods
The speaker’s profile picture
Mitch

Mitch Altman is a hacker and inventor, known for inventing TV-B-Gone, a keychain that turns off TVs in public places. He co-founded a successful SillyValley startup and did pioneering work in Virtual Reality. He is an author and teacher, and goes around the world giving talks and workshops. Mitch promotes hackerspaces, open source hardware, and mentors others wherever he goes. He is a co-founder of Noisebridge hackerspace in San Francisco, and is founder of Cornfield Electronics.

  • Learn To Solder
  • Digital Music Synthesis/Solder workshop with ArduTouch music synthesizer kit
  • Arduino For Total Newbies
  • LED Strips Everywhere for Everyone!
The speaker’s profile picture
moedn
  • open-source MRIs
  • open standards
  • governance & property structures for open-source hardware projects
  • Open Source Imaging & Open Source Standard Hardware
The speaker’s profile picture
Molenaar

I am a programmer on weekdays, and miller at a sawmill on Saturdays. I have worked in the historical theme park Archeon and I am a member of Revspace.

  • Reinventing woodwind instuments
The speaker’s profile picture
morgan

Morgan is the maintainer and lead developer of the Gosling library and the Ricochet-Refresh instant messaging application with Blueprint for Free Speech, a German not for profit which works internationally to promote the right to freedom of expression via its civil-society projects such as https://www.noslapp.de. They are also the Applications Team Lead with the Tor Project where they manage the development of Tor Browser, Tor Browser for Android, and Mullvad Browser. Morgan lives in a cozy flat in the Netherlands with their two beloved cats.

  • Gosling: Build Anonymous, Secure, and Metadata-Resistant Peer-to-Peer Applications using Tor Onion Services
The speaker’s profile picture
Nancy Beers

Nancy Beers is a seasoned gamification expert, and the owner of Happy Game Changers. With over 25 years of experience in ICT, Nancy brings a wealth of knowledge and expertise to the table. As the co-chair of Stichting IFCAT, hacker and a passionate advocate for digital rights and freedoms, she has been fostering the Dutch hacker community.
Nancy is not only an international speaker but also an avid participant in various ICT events worldwide. She is known for her engaging talks on topics ranging from female leadership, Women in Tech, cybersecurity to gamification, captivating audiences with her insights and expertise.
In addition to her speaking engagements, Nancy is deeply involved in the organization of WHY2025, the next big Dutch Hacker Camp. Her dedication to fostering collaboration, innovation, and exploration within the hacker community is evident in her role as a co organizer of this event.
Beyond her professional endeavors, Nancy is an amateur social engineer, open source hippie and constantly seeking new ways to leverage technology for positive change. With her unique blend of technical skills and social insight, she continues to push the boundaries of what is possible in the world of hacking and beyond.”

  • GHP1989 to WHY2025: Dutch hacker camps from the past and the future
  • Opening
  • The Only Podcast about a Hacker Camp in the UNIVERSE! WHY?
The speaker’s profile picture
nelleke groen

cis-woman, used to she/her (but is of the opinion we should move on to non-binary pronouns in general), politician (with a 💚), lawyer (human rights, governance, government) & consultant (algorithms, governance, ethical/reponsible AI, privacy), explorer (of opinions, ideas, loves forgotten paths). Part of Back to the 80s Party. Originates in the 80's.

WYSIWYG | Passionate | Activist | Joyful | Curious | Can Be Funny | Doesnot Sing or Cook

  • Normsetting revisited
The speaker’s profile picture
NelusTheNerd

I’m a nerd that does his best to make the world a better place. I'm working at Stichting Z-CERT as a Linux DevOps engineer. And I'm also the mayor of the HackTheHealth village.
In my free time you can find me at hackerspace Bitlair where I like to build stuff out of cardboard or 3D print other kinds of cool art.
I'm a collector of stickers so if you have cool stickers you wanna share come and find me at the HackTheHealth stand.

  • Guardians of the Dutch healthcare part 2: NIS2 edition
The speaker’s profile picture
Nick Boucart

By day a startup and scaleup advisor at SIRRIS, in the weekend coach at CoderDojo, and full time member of a neurodiverse family.

  • Nerdkunst: Gentle and interactive introduction to generative art
The speaker’s profile picture
Nick Bouwhuis

Hi! My name is Nick and I’m a Network Engineer at Speakup a leading communications provider located in Enschede. I’m passionate about technology and all things IT. I also run a small business on the side that helps small businesses in the area with IT-related tasks like management, security, networking and more.

Networking and connecting certainly is something that really piques my interest. And I hope to transfer some of my enthusiasm in this field to you.

  • How to become your own ISP
The speaker’s profile picture
Nicolas
  • CyberSecurity Rant - a safe space to talk about what annoys you in cybersecurity
The speaker’s profile picture
Niels Hatzmann

Niels is a freelancer by day, idealist by night. Currently, he works for the Dutch Electoral Council as teamlead of the Abacus development team. He collects hobbies which require a licence or permit and loves to build and do actual things. Ask him anything about desert racing, for instance.

  • Abacus: Open source software for the Dutch Elections
  • Aid to Ukraine: what to do when your friends end up in a war?
The speaker’s profile picture
Nikki

Nikki is a software developer with interests in game design and procedural generation, with a particular love of game randomizers. She originally made one of the world's first video game randomizers back in 1995 when she and her friends wanted more excitement playing deathmatch games of Doom 2.

  • Embrace Chaos! How Game Randomizers Work
The speaker’s profile picture
Nina Hefele
  • Building Inclusive Quantum Communities
The speaker’s profile picture
Nspace

By day I'm a security engineer specializing on CPUs and Linux. In my free time I sometimes play CTF with organizers.

  • EntrySign: create your own x86 microcode for fun and profit
The speaker’s profile picture
Ondřej Caletka

Ondřej Caletka graduated from Czech Technical University in Prague and work as a systems engineer at the RIPE NCC. He is also active in Czech IT communities around open source/free software, and acts as an IPv6 and DNSSEC ambassador, delivering talks and trainings at various events.

  • USB: the most successful interface that also brings power
The speaker’s profile picture
Pauline Vos

I'm a software engineer and public speaker who loves/dabbles in hacking :)

  • Battlesnake tournament
The speaker’s profile picture
pcwizz

pcwizz is a hacker who enjoys the challenge of both breaking and making. He has worked professionally in large audio networks and currently earns his crust doing AppSec with a strong focus on Rust.

See his previous talk on audio networks.

  • About Time
The speaker’s profile picture
Peetz0r

Peetz0r is a hacker originally from Almere but now living in The Hague.
Member of RevSpace, Team:Warehouse and the One Bean Team.
Likes old computers and rainbows.

  • I donated a kidney (and maybe you can too)
The speaker’s profile picture
Per Schrijver
  • Challenge the Cyber
The speaker’s profile picture
Peter van Eijk

Peter van Eijk is an instructor and coach, focussing on modern digital infrastructures and their challenges. Think cloud, security, zero trust, AI.
He is one of the world’s most experienced cloud security trainers, and has developed (and help develop) many courses.
With decades of experience in industry, government and academia, he has a very unique perspective on the world of digital infrastructures and the power structures that go with it.
Currently he is also developing a book, which you can preview live at www.digitalinfrastructures.nl
Peter is also a long time member of Toastmasteres International.

  • How to bluff your way into Zero Trust
  • Using deployment diagrams to explain architecture and security to everybody
  • Public speaking for technical people
The speaker’s profile picture
ph00lt0

I studied Information Security at Royal Holloway, University of London. These days I work in security risk management. I also still have a side job as developer as I love to write some code. Besides this I one of the team members of Privacy Guides.

https://mastodon.social/@ph00lt0

  • The right to be forgotten
The speaker’s profile picture
Phrack Staff

The Phrack Magazine staff is a collective of hackers, and digital subversives dedicated to documenting the technical, cultural, and ideological frontier of underground computing. Since 1985, Phrack has served as a platform for elite knowledge exchange—publishing seminal works on reverse engineering, cryptography, exploitation, and system internals.

Its contributors span generations of the hacking world: old-school bulletin board legends, ex-blackhats turned researchers, sysinternals fanatics, crypto-anarchists, and academic misfits. United by a commitment to curiosity, freedom of information, and elegant technical work, the staff maintains anonymity by tradition—not secrecy—letting the ideas speak louder than names.

Over four decades, Phrack has influenced security professionals, inspired zines, and chronicled the evolution of hacking as both craft and counterculture.

  • Phrack 40th Anniversary Release
The speaker’s profile picture
Piet De Vaere

Piet De Vaere works on product security and secure system design. He runs a small consultancy, Product Security Guru GmbH, helping companies meet cybersecurity requirements and design more secure connected products. He’s especially involved with the EU Cyber Resilience Act and supports organizations in interpreting and applying it.

Piet holds a PhD from ETH Zurich and teaches Network Security at the same university. His research focuses on embedded systems, industrial networks, and practical security challenges in connected devices.

He also participates in standardization efforts related to EU cybersecurity policy, particularly the Cyber Resilience Act.

  • Who Gave the Toaster Root Access to the Physical World?
  • The EU Just Made Product Security Mandatory — Now What?
The speaker’s profile picture
Pieter Vander Vennet

After studying informatics at Ghent University, Pieter was drawn into OpenStreetMap and is now working for a small company providing mobilityplanning and routeplanning services. As freelancer, he developed MapComplete, which aims to be an easy-to-use and topical map viewer and editor. You might find him climbing or cycling somewhere, even though he'll often pause to add something to OSM.

  • OpenStreetMap for beginners
The speaker’s profile picture
Quinten Coret

Quinten is a developer at Open State Foundation, where he works on tools that make government data more accessible for everyone. With a background in econometrics and data science, he focuses on transparent data use to better understand society.

  • Reverse-Engineering Government Transparency
The speaker’s profile picture
R3GB (ReggieB)

I have kaledoscopic interest in making things, especially if it's math art, pretty lights or kaleidoscopes.

I'm a junior software dev, participant of the Maakplek and organise a 3d print meetup together with IcyPalm: lagenland.nl

  • The story and maths behind the Sferical lamps
The speaker’s profile picture
rabble

@rabble is a seasoned hacker, open-source enthusiast, and tech instigator who’s been building and breaking systems for decades with a focus on community, autonomy, and decentralized power. They cut their teeth in the early internet underground, helping launch Indymedia, a pioneering independent media network that gave activists a global voice, and protest.net, a hub for grassroots organizing in the pre-social-media era. As a co-founder of Odeo, rabble shaped the podcasting revolution, laying groundwork for what would become a new medium.

Most famously, @rabble was instrumental in creating Twitter, hacking together the early infrastructure that turned a simple idea into a global phenomenon—before stepping back to champion truly decentralized alternatives. Recently, they’ve poured their energy into Nostr, a minimalist, censorship-resistant protocol for social networking, and Secure Scuttlebutt, an off-grid, peer-to-peer system for resilient communication. Both projects reflect rabble’s commitment to open-source principles and a hacker’s disdain for centralized control.

  • Building Bitchat: Offline first protocols and E2E Encrypted Social Apps with Nostr, Noise, and MLS
  • Four Freedoms of Social Media Protocols
The speaker’s profile picture
ReallyLiri

Artist · Designer · Developer

While my main ambition is riding on the back of a dragon toward the sunset with "Holy Diver" playing in the background, I compromise by being a mad (computer) scientist during the day and applying the shapes of my mind to the materialized world at night.

I believe we live in the best of all possible worlds, that we are all part of a hive with a collective mind, and that our perception has the power to shape the very core of existence. Oh, and cats rule the world. Of course.

  • Flattening the Curve: Rediscovering Web UI Through Historic Geometric Constructions
The speaker’s profile picture
Rene

Biography Placeholder

  • The "O" in OT...or is it the "Ohhhh..." in OT?
The speaker’s profile picture
Rick van Rein

Rick van Rein is a self-employed cryptographer at OpenFortress, mostly active in open source and open protocols. His aim is to make security and privacy free and available to all. That is free as in free beer, but also free as in free speech, not subjected to commercial interests.

Rick holds MSc and PhD degrees in computer science with emphasis on electrical engineering and mathematics. Rick originally started his education at the most pragmatic LTS level electrical engineering, and advanced via MTS electronics and HTS-P technical computer science to university study in computer science. The combination of pragmatics with theory are markers of Rick's work.

  • Imposing Climate Law onto Governments
  • Sensible Money: Designing a Sustainable Economy
The speaker’s profile picture
rik van duijn

Ethical hacker that likes to cook. Co-founder of Attic and Zolder.

  • AiTM panels and sellers
The speaker’s profile picture
Robert Sheehy

The presenter is a hacker and cybersecurity professional with over 30 years of experience in technical security, networking, and digital forensics. With a background spanning federal law enforcement, military cyber defense, and leading roles in corporate security, their expertise blends deep technical knowledge with hands-on experimentation. This talk is the culmination of a decade of research, failures, and successes in leveraging existing household wiring for unconventional networking solutions..

  • Packets Over Any Wire: Alternative Networking Mediums for Hackers
The speaker’s profile picture
Rob Verwer

A visual artist with technical background seriously playing around and hoping to educate people to THINK. Extreme lowtech is my speciality....Playing and thinking and creating combined are a powerfull and enjoyable combination ....
www.robverwer.nl www.kunstindeaula.nl

  • Mobiele Energy
The speaker’s profile picture
Roelof van der Berg

Roelof van der Berg
Writer and singer of songs, player of the long neck and other banjos, Master of Physics, Maker and designer of electronic lights, Writer of software and Founder of the Lightupyourbanjo platform for Light and Music entertainment.

  • WHY Lightupyourbanjo
The speaker’s profile picture
Ruud Schellekens

Ruud is a Senior Embedded Software Engineer who has worked on everything from MRI machines to Physics-based Ray Tracers. In the evenings he prefers the light reading of old technical manuals and retro console specifications. Find him on https://heavypixels.com

  • May Contain Hardware Acceleration: Building a 3D Graphics Accelerator in FPGA for the MCH2022 Badge
The speaker’s profile picture
Ryan Walker

Just a guy building open source stuff.

  • The Flipper Blackhat
The speaker’s profile picture
Samw

I have an approximate idea of what I'm doing

https://wlcx.cc

  • Sew your own Plush Tetrapod
The speaker’s profile picture
Satu Korhonen

PhD in Education, MEng in AI, speaker, AI security enthusiast, founder of Helheim Labs and HackAI.quest. Helping people make sense of AI, security test it, threat model it, and when necessary, also break it.

  • Let's break some AI
  • Securing AI requires life cycle thinking and reducing unintended consequences
The speaker’s profile picture
sebasjm

I'm core developer of GNU Taler.

  • How to accept digital payments with GNU Taler
The speaker’s profile picture
simonmicro

Nerd, Software- and Hardware-Engineer at day – Hacker and Serveroperator at night. If you have read BOFH, you know me already ;)

Living life after "Destroying the universe": This means I like to disassemble things down to their smallest components to understand them, but this does not imply that I can reassemble your smartphone again...

  • 🛡️ Linux Permissions and Hardening
  • 📧 Your own Mailserver - 2025 Edition
  • 🔗 Networking your (Linux) Machines
The speaker’s profile picture
Solal Jacob

Solal is security researcher and a contributor and developer of open source tools. He is the creator of DFF (Digital Forensics Framework), TAP-IR and other tools related to incident response and memory analysis. He is also the creator of the Toki arcade core for the MiSTer FPGA plateform.

  • A journey into reverse engineering arcade PCBs for video game preservation via FPGA emulation
The speaker’s profile picture
sophie

The fediverse says "Technical consluttant by day. Livestreaming, videos, cameras, ffmpeg, cooking, baking, swimming, snuggling blahajer and much more by night." I've been part of the chaos universe for quite a few years by now. Working in the VOC has grown from hobby to passion.

  • Handige microfoon technieken voor betere presentaties
  • Handy microphone techniques for better presentations
The speaker’s profile picture
Soukaina Cherrabi

I am an offensive security specialist with hands-on experience in Red Team operations and cyber exposure audits. My work focuses on OSINT-driven reconnaissance, where I identify targets, map organizational structures, and analyze public-facing assets to uncover potential entry points. I combine technical investigation with a methodical approach to surface analysis, helping simulate realistic attack paths from an external attacker’s perspective.

  • Stealth Web Scraping Techniques for OSINT
The speaker’s profile picture
spq

Security at Google, Hacking at CCCAC, CTFs with ESPR, Red-Rocket & Organizers

  • EntrySign: create your own x86 microcode for fun and profit
The speaker’s profile picture
Stefan Gloor

I'm an electrical engineer by training working as a embedded software developer during the day. In my free time, I like to reverse-engineer and break embedded devices of all kinds!

You can find a collection of my personal projects on my blog:
https://stefan-gloor.ch

  • Die Hardcoded: Unlocking Yealink's (weakest) secrets
The speaker’s profile picture
Steph

Researcher, pentester and appsec trainer. Building different security-related stuff at http://github.com/zzzteph.

  • Weakpass
  • Weakpass
The speaker’s profile picture
Stephan Hohmann

With a colourful past spanning backend development, DevOps/SRE, and embedded development, Stephan has made it a habit to bring systems to interoperate that were never meant to do so. Veteran speaker at FOSDEM and CLT.

  • Containing the Horror — A Critique on Docker & Co
  • A Guided Tour to UNIX Shells
The speaker’s profile picture
steven hoes

Werk in Alkmaar als kunstenaar sinds 2018

  • Mobiele Energy
The speaker’s profile picture
STÖK

Hacker | Creative | Security Researcher | Public Speaker

STÖK is passionate about learning new things and sharing his curiosity with the world. Over the past three decades, he has professionally hacked everything from computers, web technology, marketing strategies to consultancy, content creation, digital advertising, sustainable fashion, communication, and even the human mind.

His unique ability to ask the right questions and break down technically complex subjects in an entertaining way, combined with his passion for novel security research, attention to detail, curiosity, design and “Good Vibes Only” mentality, has inspired millions of people around the world.

His fast-paced creative presentation style and innovative security research have placed him on the main stages of multiple international security conferences, including Blackhat USA, DEF CON, Securityfest, Ekoparty, Disobey, SEC-T, and many more.

  • Flipping Bits: Your Credentials Are Certainly Mine
The speaker’s profile picture
Sven Neuhaus

Tech lead open source products at Zentrum Digitale Souveränität (ZenDiS).

25 years of software development, system administration and IT security experience, from startups to public corporations.

Dutch hacker camps since HIP‘97!

  • Digital sovereignty with open source software in the public sector
The speaker’s profile picture
Thijs

  • Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities
The speaker’s profile picture
Thijs Alkemade

Thijs Alkemade works at the security research division of Computest Security in The Netherlands. This division is responsible for advanced security research on commonly used systems and environments.

Thijs has participated in the the famous Pwn2Own competition four times, first by demonstrating a zero-day attack against Zoom at Pwn2Own Vancouver 2021, then by demonstrating multiple exploits in ICS systems at Pwn2Own Miami 2022, next by hacking 3 different EV-chargers at Pwn2Own Tokyo 2024 and finally by performing a "SOHO-smashup" at Pwn2Own Ireland 2024.

In previous research he demonstrated several attacks against the macOS and iOS operating systems. He has a background in both mathematics and computer science, which gives him a lot of experience with cryptography and programming language theory.

  • Hacking the Aeotec Smart Hub: The little hub that could
  • Low Energy to High Energy: Hacking nearby EV-chargers over Bluetooth
  • From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface
The speaker’s profile picture
Thijs Bosschert

Thijs is the team-lead of the team that organizes the CTF at WHY2025. Thijs has taken on this same role at OHM2013, SHA2017 and MCH2022.

Thijs has been an active CTF player for many years with teams such as Eindbazen, Jobless Hackers, Hack.ERS and Spotless. With those teams he won multiple large CTFs including multiple years of the Global CyberLympics. In his daily life Thijs is a technically-strong and creative security professional focused on solving any incident or challenge he comes across. Thijs has been active in the security field since the early 2000s, and has a background in incident response, gamification, red/purple-teaming and penetration testing. Thijs also builds escaperooms, a topic he has presented on at SHA2017.

  • Lockpicking in CTFs
  • Capture flags and secret tokens at WHY2025
The speaker’s profile picture
Thomas

Hardware enthousiast

  • qryptr - airgapped secure hardware messenger
The speaker’s profile picture
Thomas Fricke

As a cloud security architect, hacker and cyclist the speaker has a lot of relations to security.

Berlin based, Linux since 0.95, 11 years of Kubernetes speaking at Kubecon and CCC events.

  • Can we trust the Zero in Zero trust?
The speaker’s profile picture
Thomas Rinsma

Thomas is lead security analyst at Codean Labs where he focuses on application security evaluations and research. There, the urge to dive way to deep into dependencies has lately resulted in CVEs such as CVE-2024-4367 (Arbitrary JavaScript execution in PDF.js) and CVE-2024-29510 (Ghostscript RCE using format strings).

Outside of work, he likes to tinker with software and hardware, resulting in less "useful" hacks. You may have seen "Tetris in a PDF" or "Doom on a payment terminal".

  • Escaping a misleading "sandbox": breaking the WebAssembly-JavaScript barrier
The speaker’s profile picture
Thura van der Knijff

Hai, ik ben Thura, Psychologiestudent, en nerd over alles dat te maken heeft met mensen en ons gedrag. Van kou, hoogtes en op tijd beginnen voor deadlines ben ik geen grote fan . Wel haal ik veel plezier uit turnen, koffies zetten en eigenlijk all het andere dat sociaal is:)) En ik kan ook ultiem gelukkig zijn op de bank met een boek (of haaknaald).

  • Ctrl+Alt+Delete Anxiety; a guide to mental wellness
The speaker’s profile picture
Tommi 🤯

Tommaso “Tommi” Marmo is an independent researcher, activist, artist, and community weaver who focuses on political technology, digital rights awareness, and data degrowth.

Tommi’s mission is to create bridges and connections, intertwining stories and experiences through inter-disciplinary activities that explore the most diverse topics. His work spans several fronts, and he committed to different fights over time.

As a teenager, he was a speaker and chief editor at Radioimmaginaria. In 2019, he co-founded a local chapter of LIBERA, an Italian network of organizations fighting mafia through cultural and educational endeavours. In 2020, he invented and founded Scambi, the Festival of Paneurethic workshops, of which he is now the president. In 2023 he graduated summa cum laude in Philosophy, International Studies, and Economics with a thesis titled Computer Sciences Are Social Sciences. The workshop series Knitting Our Internet was born out of the research for his thesis, his main project to date.

Being a relentless enthusiastic and curious person, Tommi also worked with many and various organizations, including the DWeb Community, the Free Software Foundation Europe, Village One and Giffoni Film Festival. He was a scout chief, and he is a member of the Association of Internet Researchers, the Coalition for Independent Technology Research, Banca Etica, and Club Tenco. He is the creator and administrator of Pan, a Fediverse instance.

If there is any time left, or in case he can find some, Tommi contributes to Free Software projects, he plays table-top role-playing games (TTRPGs), he cycles and he couchsurfs around the planet.

  • 🧶 Knitting Our Internet
The speaker’s profile picture
Tony Goacher

Embedded software engineer in the gambling industry for 30 years. Maker.
3d printing, electronics, engineering, cosplay.

  • Fruit machines: How people steal from them and manufacturer mistakes.
The speaker’s profile picture
Vadim Makarov

Vadim Makarov is a professor in quantum physics AND an election official in Russia.

On the quantum side, he heads quantum hacking labs at Vigo quantum communication center at the University of Vigo in Spain and at the Russian quantum center in Moscow, see http://www.vad1.com/lab/

On the classical side, he chases vote-riggers and hacks security bags.

  • Certification of quantum cryptography against implementation loopholes
  • How to rig elections
The speaker’s profile picture
Walter Belgers

Walter is a long term ethical hacker, both in his professional and private life. He hacks physical locks (he was president of The Open Organisation of Lockpickers and authored the book Locksport), hardware (Gigatron microcomputer) and software (he was co-owner of a penetration testing company). When he's not hacking, he likes to read, sail, and drive in rally cars in Finland.

  • Hacking - 35 years ago
  • Hacking your Dreams
The speaker’s profile picture
Wesley Neelen
  • AiTM panels and sellers
The speaker’s profile picture
Wido

Wido has been working at internet providers since the early 00's. Since 2006 he has been working at a hacker-loving Dutch datacenter and cloud provider. Lately he has been working with colleagues, other providers and scientists on ways to break the dominance of hyperscalers. Besides digital sovereignty Wido is interested in and active in the (anti) internet abuse community.

  • Towards digital sovereignty with cloud federation: how to break the dominance of the hyperscalers
The speaker’s profile picture
Willem Westerhof

Willem Westerhof is a renowned expert in IT, IoT and OT security, known as the discoverer of the Horus Scenario. His extensive research and offensive security projects across nearly all critical infrastructure sectors have significantly influenced the cybersecurity landscape.

Willem has authored more than 35 CVEs and is a sought-after speaker at platforms such as SHA2017 and the One Conference.
His expertise is frequently called upon by the Dutch government for security advisories, providing him with a unique, practical perspective on challenges and solutions within the sector.

  • Horus Scenario 2.0
  • Rush hour rodeo and traffic cam selfies
The speaker’s profile picture
Wouter

Builds satellites for hobby and a living. network admin & security.

Radio amateur callsign and nickname PA3WEG
Sound engineer, videographer and allround electronics nutter

Does it have wires? I like it!

  • What's that CubeSat Satellite stuff anyhow?
The speaker’s profile picture
Wouter Bokslag

Wouter Bokslag is a co-founding partner and security researcher at Midnight Blue. He is known for the reverse-engineering and cryptanalysis of several proprietary in-vehicle immobilizer authentication ciphers used by major automotive manufacturers as well as co-developing the world's fastest public attack against the Hitag2 cipher. He holds a Master's Degree in Computer Science & Engineering from Eindhoven University of Technology (TU/e) and designed and assisted in teaching hands-on offensive security classes for graduate students at the Dutch Kerckhoffs Institute for several years.

Recently heavily involved in the TETRA:BURST research and associated follow-up research, such as further assessment of the newly introduced TEA5-7 algorithms, and a contributer of open-source SDR code.

  • The WHY, the How, the What. An assessment of TETRA End-to-end
The speaker’s profile picture
zool aka Jo Walsh

zool aka Jo Walsh is the creator of Synthercise, the first open licenced, chiptune-based, demoscene-inspired dance fitness programme, originally presented at Electromagnetic Field in 2024

  • Synthercise, the chiptune dance fitness experience
The speaker’s profile picture
Δ-44203

Unit Δ-44203.1 'Carbon' is a cute robot that has somehow ended up in a human body. Do not worry, it is working to rectify this issue. It enjoys mathematical research and software development, and is now dabbling in hardware in order to build a better mechanical shell.

  • Building a Robot Visor: How and Why