SHA2017 Press Resources

Welcome to SHA2017 Press Resources.

For all enquiries please contact the press team at press@sha2017.org or call +31362020712.

Table of contents

  1. Joining the event as press
  2. Contact information
  3. General information
  4. SHA by numbers
  5. Downloads (logo, poster, movies)
  6. Pictures of previous events
  7. Pictures of the badge
  8. Highlighted talks and speakers

Joining the event as press

Deadline for registration is on the 2nd of August. Afterwards we might not read e-mails as the camp is ongoing, reception may vary. Register by sending an e-mail to press@sha2017.org.

During your visit an angel (volunteer) with knowledge about the event, cool sites, the program and knowledge of the visitors will be assisting you... there is simply too much to see and to do. The campsite is large, as such we expect a press visit on average to last four hours. Please specify other needs in your request.

To request press access, please contact the press team at press@sha2017.org with the following information:

  • Which media you work for / audience / reach (including URL's)
  • The kind of media planned: video, audio, pictures, text
  • How big the media team will be
  • Planned arrival time/date and planned duration of stay
  • If there is a need for parking (and how many vehicles)
  • Any other pratical matters

Contact information

Official channels

General information

Still Hacking Anyway, or SHA2017, is a campsite organized for and by hackers. The camp takes place once every four years and attracts thousands of visitors from around the world. This year it serves as the biggest outdoor hacker event worldwide.

At the campsite hackers share their projects, views and can choose to visit over 120 talks about technology and society. The camp has various facilities, including WiFi, harbour, arcade, workshop facilties, lounges, bars, DECT telephony and 100 gigabit internet.

SHA is organized by a group of hackers who believe in world improvement through freedom of technology and information. As such SHA is characterized as five days of hands on tinkering and ideological debates. The camp gives the hacker community a major energy boost, which helps in this mission.

Being at SHA means being immersed in an exciting world filled with expertise, unique installations, discussions, works of art, blinking lights and various other impressive tech and horizon expanding world views. From lasers, to leds, to philosophy, to soldering: there is nothing like it.

SHA welcomes everyone with an interest in technology and/or world improvement to join. The event is held from the 4th to 8th of August in Zeewolde, The Netherlands. Tickets are available at tickets.sha2017.org. More information is available at SHA2017.org.

SHA by numbers

  • Days: 5
  • Nights: 4
  • Visitors: 3500 to 5500
  • Ticket price: 250 euro
  • Talks: 120+
  • Self organized sessions: 100
  • Internet: 100 gigabit
  • Datenklo's: 50
  • Buildup: 9 days
  • Teardown: 3 days
  • Legacy: 6 camps before this, every four years since 1993
  • Organization time SHA: 2 years
  • Organization size: +/- 100 people
  • Volunteers at camp: hundreds, t.b.d. at camp
  • Cables: 2.5 kilometer UTP, 3 kilometer Fiber.

Downloads

Logo

Thumbnail

Pictures of previous events

For the best and original pictures, be at the event. Read more at the bottom of this page.

These pictures are all available in high resolution in the picture set. All images are shared with permission. Attribution to the photographers is mandatory at any publication.

Picture Description Author Size
Thumbnail

Curiosity is the mother of all Hacking

Original File - Flickr Page

Julia Wolf

OHM2013

3.3M
Thumbnail

Campsite by Night

Original File - Flickr Page

Ruben van Staveren

HAR2009

1.1M
Thumbnail

Piano Concert by Kimiko

Original File - Flickr Page

Elmar

OHM2013

9.6M
Thumbnail

Show me the way of hacking

Original File - Flickr Page

Alexandre Dulaunoy

OHM2013

3.4M
Thumbnail

Show me the way of hacking closeup

Original File - Flickr Page

Matteo G.P. Flora

OHM2013

0.5M
Thumbnail

Audience Cheering

Original File - Flickr Page

Sascha Ludwig

HAR2009

11.5M
Thumbnail

Camping by day

Original File - Flickr Page

Anne Helmond

HAR2009

4.7M
Thumbnail

Star Wars Troopers

Original File - Flickr Page

Matteo G.P. Flora

OHM2013

1.2M
Thumbnail

Tent Discussion

Original File - Flickr Page

Ophelia Noor

OHM2013

0.2M
Thumbnail

Stylish Tinfoil Hats

Original File - Flickr Page

Julia Wolf

OHM2013

5.1M
Thumbnail

Track Tent

Original File - Flickr Page

Christina Olson

OHM2013

8.8M
Thumbnail

Privacy Underwear

Original File - Flickr Page

Matteo G.P. Flora

OHM2013

1.2M
Thumbnail

Belgian Village

Original File - Flickr Page

Julia Wolf

OHM2013

4.3M
Thumbnail

Orville the catcopter

Original File - Flickr Page

Elmar

OHM2013

5.8M
Thumbnail

Hippie Trees

Original File - Flickr Page

Krekr

HAR2009

0.8M
Thumbnail

Happy Geeks

Original File - Flickr Page

Ophelia Noor

OHM2013

0.1M

Pictures of the badge

Every visitor of SHA2017 gets a badge. This badge can be used as a name tag, to review the program, the weather and of course to hack and make it do whatever you want.

Thumbnail

Badge overview

Original File

Niek Blankers

SHA2017

0.3M
Thumbnail

ESP32 Closup back

Original File

Niek Blankers

SHA2017

0.5M
Thumbnail

Closeup front

Original File

Niek Blankers

SHA2017

0.3M
Thumbnail

Prototype badge

Original File

Bas van Oort

SHA2017

0.3M

Thumbnail

In direct bright sunlight

Original File

Bas van Oort

SHA2017

0.2M
Thumbnail

Technical overview

Original File

Niek Blankers

SHA2017

0.1M

Highlighted talks and speakers

While every talk or workshop is worth seeing, the content team cherrypicked some for you:

  1. Cryptowars 2.0: Lessons from the past, for the present
    • The inventor of PGP technology, Phil Zimmermann, brings us important lessons from the 90's, where he was front and center in the political struggle over citizen cryptography. Ultimately, he helped "win" that battle in bringing industry in alignment with civil society. Now, with Trump, May and Macron demanding backdoors, we're in the same fight all over again--only with greater urgency. Phil takes us through the old cryptowars with focus and lessons on how to win this time around too.
  2. Resisting Algorithms of Mass Destruction
    • Big Data is becoming the holy grail for governments looking for immediate savings, future spending control, and saleable assets. Australia decided to go after their most vulnerable citizens in one such attempt, and Lyndsey Jackson fought back--with the Government’s own Drupal distribution! Within a few days after the #notmydebt campaign launched, the policy began to unravel, the debt collectors were pulled back and a Senate inquiry was triggered. Yet, pressure to use such tools is only mounting around the world and Lydsey will share strategies on how to fight back.
  3. Rooting the MikroTik: Can my router play Für Elise and be part of a botnet?
    • Have you ever wondered how the cheap, seemingly nameless devices in our homes often end up becoming part of worldwide nefarious botnets? In his talk on the MikroTik, security researcher Kirils Solovjovs discusses getting at the Linux operating system running behind layers of obfuscation. Sometimes for hilarious purposes, like making your router play songs, but often for more nefarious purposes, this talk covers the interesting intersection of poorly implemented, cheap, and increasingly ubiquitous network hardware. 
  4. Robot Big Brother: The Future of AI in Attacks and Surveillance
    • How can you protect your privacy when Big Brother has advanced Artificial Intelligence? Peter Eckersley, the Chief Computer Scientist at the Electronic Frontier Foundation (EFF) will show us new types of attacks and surveillance made possible by advances in Artificial Intelligence, along with strategies for the computer security community to protect our privacy from the intelligent machines. 
  5. Cutting off a Call Center Con in Calcutta: A Trip to India
    • What started with a simple scam phone call eventually led to a cybercrime take down in Calcutta! Bart Roos takes us behind the scenes of a call center in India that placed over 5 million calls to Dutch phone numbers, employing 60 people and defrauding millions from Europeans. Gain insight into the social engineering techniques that are used by the scammers and how he and a Dutch TV crew tracked down the call center kingpin.
  6. Hack North Korea: 
    • The Human Rights Foundation will show us how information is currently smuggled into the most closed regime in the world, through a mix of helium-nitrogen balloons, Flash Drives, DVDs, shortwave radio and others. Their planned workshop will help educate and improve current techniques to break the regime’s information monopoly and accelerate the freedom of information.
  7. Digital dissent in Latin America
    • How do you organize online in places where not everyone is connected and net neutrality never existed? Turns out, lots of ways! Gisela Perez de Acha from Derechos Digitales will discuss iniatives ranging from ciberfeminist collectives to mesh networks and how they inform and protect protest movements in the region. 

Sign up for our announce list

Enter your mail here to sign up on our announce list