{"schedule_speakers":{"version":"V.1.0.0","speakers":[{"id":240,"image":null,"full_public_name":"Albert","abstract":"","description":"I'm a software developer and system adminstratior for some years.\r\ni first enountered linux around 20 years ago and have been using mostly unixoid operating systems for nearly as long.\r\nI have also been active in the free software movement and especially in the free software foundation europe for over ten years now.","links":[],"events":[{"id":248,"guid":"26df45ba-2f9b-41a5-ba7f-ee9a48e76b9a","title":"Free Your Android","logo":null,"type":"workshop"}]},{"id":248,"image":"/system/avatars/248/medium/blahaj.jpg?1533283343","full_public_name":"Arnim Eijkhoudt","abstract":"Miscreant Puncher at KPN-CERT","description":"","links":[],"events":[{"id":269,"guid":"3d37c0a1-d26a-4d73-a5d5-70cfe772c90f","title":"Phishing Phishers","logo":null,"type":"lightning_talk"}]},{"id":226,"image":"/system/avatars/226/medium/Bogdan_Doroslovac_796x796px.jpg?1522090048","full_public_name":"Bogdan Doroslovac","abstract":"Geek of all trades, multitasker extraordinaire and embedded aficionado","description":"During my studies of Mechanical Engineering, I committed myself towards Weapon Systems - Rocket systems and Guidance, Navigation & Control in particular. Primarily my work was regarding 6DOF modeling and flight mechanics, Software-In-the-Loop and Hardware-In-the-Loop (HIL & SIL), and later IMU calibration.\r\n\r\nThere was a slow natural descent from algorithms and simulation and into embedded world. In my free time, I tend to keep myself busy that is why I train Krav Maga, juggle and tinker with soldering iron and electronics. Typically, I try to master a simple motoric skill or trick each month. \r\n\r\nI am a geek and gamer down to the bone and I enjoy RPG games anywhere from GURPS and D&D to Skyrim and Fallout.","links":[],"events":[{"id":221,"guid":"80c7b99b-73a9-4648-aca1-02d44bc96c86","title":"Dancing in the Dark","logo":null,"type":"lecture"}]},{"id":223,"image":null,"full_public_name":"Frank Rustemeyer","abstract":"Frank Rustemeyer is director and COO at the German security consulting specialist HiSolutions AG. He has studied Information Management in Germany, England and the US and has accumulated almost 20 years of work experience as a security auditor and consultant. Frank is licensed by the National Office for Information Security to carry out certification audits according to national security standards. He is also a lecturer at the Technical University of Berlin and the Frankfurt School of Management and Finance. ","description":"","links":[],"events":[{"id":220,"guid":"7e6b133b-5bf9-4d75-b27a-466f8049acb3","title":"Spectre & Co. For Mere Mortals","logo":null,"type":"lecture"}]},{"id":138,"image":"/system/avatars/138/medium/hettipic.jpeg?1472508917","full_public_name":"Hetti","abstract":"Technical Computer Science student from Vienna with a passion for IT Security and geeky stuff.","description":"He is one of the board members of the finest Viennese Hackspace Metalab.\r\nIn his free time he enjoys travelling to community based IT Conferences.\r\nThe Viennese Cryptoparty is organized by him, where he also holds lectures and workshops about a broad range of IT Security & Privacy topics.\r\n\r\nYou can also find him at the Chaos Computer Club Vienna (C3W).\r\nOn some weekends he is hunting flags with the successful academic CTF Team We_0wn_Y0u.","links":[],"events":[{"id":240,"guid":"9cf3ccb1-2468-4615-b658-4dd08ad2d5e5","title":"Security Safari in b0rkenLand","logo":null,"type":"lecture"}]},{"id":238,"image":"/system/avatars/238/medium/igor_400x400.jpg?1531563686","full_public_name":"Igor Nikolic","abstract":"Hacker, makers, wannabe artist, academic and dad","description":"","links":[],"events":[{"id":260,"guid":"0371c4eb-5af9-4b55-9486-f23a77d5c7fb","title":"Sustainability challange and the role of hackers","logo":null,"type":"lecture"},{"id":261,"guid":"ed05bd2e-ed5e-4651-aee6-7748d1d06c1c","title":"Dicussion on sustainability and hackers","logo":null,"type":"workshop"}]},{"id":239,"image":null,"full_public_name":"Jean-Philippe Aumasson","abstract":"","description":"","links":[],"events":[{"id":242,"guid":"af5b8751-579f-4c0c-bb52-435ae84c530a","title":"Blockchain: the top 10 security disasters","logo":null,"type":"lecture"}]},{"id":242,"image":"/system/avatars/242/medium/avatar.png?1530530058","full_public_name":"Johnathan Roy Azaria","abstract":"I'm a Data Scientist who's main focus is in the field of Network Security and DDoS mitigation in particular. \r\nI work as a Security Researcher at Imperva Incapsula.","description":"","links":[{"url":"https://www.linkedin.com/in/johnathan-azaria-147b74b0/","title":"Linkedin"}],"events":[{"id":254,"guid":"a8382e60-03b6-4620-bef5-39fe775a7c94","title":"Masked reflected DDoS attacks, and how to protect against them","logo":"/system/logos/254/medium/logo.jpeg?1530543069","type":"lecture"}]},{"id":160,"image":"/system/avatars/160/medium/rdc.jpg?1472484397","full_public_name":"Kirils Solovjovs","abstract":"
Mg. sc. comp. Kirils Solovjovs is the lead researcher at Possible Security and the most visible white-hat hacker in Latvia. He fluently speaks English and has extensive experience in network flow analysis, reverse engineering, social engineering, penetration testing, security incident investigation, and the legal dimension of cyber security and cyber defence. He has contributed to improving security of both national and international information systems.
","description":"","links":[{"url":"http://kirils.org/","title":"Research page of Kirils Solovjovs"}],"events":[{"id":236,"guid":"daf978a9-31c5-44ff-90da-0fd09a2e711d","title":"Toll of personal privacy in 2018","logo":null,"type":"lecture"},{"id":237,"guid":"74f822af-d31e-4762-a473-3ab98eaec3a7","title":"Impact of domain name dropcatching on business security","logo":null,"type":"lecture"}]},{"id":97,"image":null,"full_public_name":"Kost","abstract":"Vlatko Kosturjak is security consultant at Diverto where he helps clients to reach desired security level(s). He likes to break and build depending on the mood and time of day(night). Beside security, his passion is open and free software, so he authored many open source offensive tools and contributed code to various free security software like OpenVAS, Nmap and Metasploit.","description":"","links":[],"events":[{"id":257,"guid":"3c477804-5108-4a52-a9d2-c1f5b9c62390","title":"Application Container Security","logo":null,"type":"lecture"}]},{"id":190,"image":null,"full_public_name":"Lazar Stri\u010devi\u0107","abstract":"Computer architecture and operating systems enthusiast","description":"","links":[],"events":[{"id":247,"guid":"7fd9eae1-d68a-4f27-ae4f-0b358bafd813","title":"RISC-V - an open CPU instruction set","logo":null,"type":""}]},{"id":164,"image":"/system/avatars/164/medium/MacLemon_Logo_256.png?1533487204","full_public_name":"MacLemon","abstract":"Sysadmin by trade, strong supporter of anonymity and privacy, that odd person doing strange things with Macs, Hackspace and community affiliations: Metalab; Chaos Computer Club Wien; BSidesVienna, Cocoaheads","description":"","links":[{"url":"https://maclemon.at/","title":"Something like a blog or so"},{"url":"https://chaos.social/@MacLemon","title":"Fediverse (Mastodon) - preferred"},{"url":"https://twitter.com/MacLemon","title":"Twitter"},{"url":"@MacLemon:maclemon.at","title":"Matrix"}],"events":[{"id":255,"guid":"b6065800-e679-4812-b8ad-aef8a9c4b78b","title":"Backups (occasionally\u2026)","logo":"/system/logos/255/medium/IMG_6951.JPG?1530658658","type":"lecture"},{"id":256,"guid":"03eddd06-bd89-42e4-bc99-170f701539ee","title":"Email, how does it even work?","logo":"/system/logos/256/medium/_.png?1530658916","type":"lecture"}]},{"id":235,"image":"/system/avatars/235/medium/corto-maltese.jpg?1529842142","full_public_name":"Marko Letic","abstract":"Front-end engineer - Data visualization scientist - JS enthusiast","description":"Marko Letic is a front-end engineer, lecturer and data visualization scientist. He is currently connected with a Berlin-based company named AVA where he is working on a platform that combines big data, pattern recognition and artificial intelligence to take the safety of individuals, organizations, cities, and countries to a whole new level. His main role is to create a contextual analysis of the processed data through a web-based client application. Marko is a long time member of DAFED, a non-profit organization that is working on networking and educating the IT community in the region. He holds a MSc degree in Computer Science and is pursuing his PhD in data visualization. He sometimes writes fiction novels that probably will never get published as he spends too much time coding.","links":[{"url":"https://www.markoletic.com/","title":"markoletic.com"},{"url":"https://mobile.twitter.com/NisamProgramer","title":"twitter"},{"url":"https://codepen.io/mletic/","title":"codepen"}],"events":[{"id":234,"guid":"a8a7ebd1-6c88-4adf-a840-d37dbfc92598","title":"Bringing Mixed Reality to the Web","logo":null,"type":"workshop"}]},{"id":237,"image":"/system/avatars/237/medium/02_Policy-Meeting2_square_small.jpg?1531753141","full_public_name":"Max Mehl","abstract":"Max Mehl is Program Manager at the Free Software Foundation Europe (FSFE) and loves to coordinate policy and public campaigns. With his mixed background in information technology and political science he can build bridges between different audiences to explain why software freedom and control over our computer systems is required to secure democracy, digital infrastructure, and a fair economy in the 21st century.","description":"","links":[{"url":"https://fsfe.org/about/mehl/","title":"FSFE Profile"}],"events":[{"id":235,"guid":"83932ebd-bfba-44df-b30e-7b19947eebd2","title":"Public Code with Free Software","logo":"/system/logos/235/medium/pmpc-logo-web.jpg?1529939402","type":"lecture"}]},{"id":74,"image":null,"full_public_name":"Milan Gabor","abstract":"Milan Gabor is a Founder and CEO of Viris, Slovenian company specialized in information security. He is security professional, pen-tester and researcher. ","description":"Milan is a distinguished and popular speaker on information security. He has previously been invited to speak at various events at different IT conferences in Slovenia and loves to talk to IT students at different Universities. He also leads teaches ethical hacking. He is always on a hunt for new and uncovered things and he really loves and enjoys his job.\r\n\r\nHe organized big number of different workshops and presentations around the world. Lately he has been presenting at this conferences:\r\n \r\n\u2022 Conference Hackito Ergo Sum 2014, France\r\n\u2022 Conference OTS 2014, Slovenia\r\n\u2022 Conference BIT\u2019s 3rd Annual World Congress of InfoTech 2014, China\r\n\u2022 Conference BSidesLV 2014, USA\r\n\u2022 Conference DEF CON, Workshop Wall of Sheep 2014, USA\r\n\u2022 Conference BalCCon 2014, Republic of Serbia\r\n\u2022 Conference Hacktivity 2014, Hungary\r\n\u2022 Conference GrrCON 2014, USA\r\n\u2022 Conference DeepSec 2014, Austria\r\n\r\nHe held this workshops:\r\n\u2022 Housing Slovenia (6 times - Ethical hacking workshop 5 days each)\r\n\u2022 Palsit Slovenia (Ethical hacking 5 days workshops)\r\n\u2022 Hacking mobile applications (BSides Ljubljana (2015), OTS conference Maribor (2015), Hacktivity conference Budapest (2014))\r\n\r\n","links":[],"events":[{"id":231,"guid":"0ecfbe04-06e2-472b-8eed-959204b5fc38","title":"How I survived ICO!","logo":null,"type":"lecture"}]},{"id":78,"image":"/system/avatars/78/medium/Screen_Shot_2016-07-01_at_10.44.13_PM.png?1467428026","full_public_name":"Robert Simmons","abstract":"Robert Simmons is Director of Research Innovation at ThreatConnect, Inc. His expertise is using automation and open source software to improve information security.","description":"Robert Simmons is Director of Research Innovation at ThreatConnect, Inc. With an expertise in building automated malware analysis systems based on open source tools, he has been tracking malware and phishing attacks and picking them apart for years. Robert has spoken on malware analysis at many of the top security conferences including DEFCON, HOPE, botconf, and DerbyCon among others.\r\n\r\nRobert, also known as Utkonos, has a background in biology, linguistics, and Russian area studies. He has lived extensively in Russia and Ukraine and has been known to swear profusely and constantly in Russian.","links":[{"url":"https://threatconnect.com/blog/","title":"ThreatConnect Blog"}],"events":[{"id":262,"guid":"530edaa7-d31a-4f1f-87ed-23f1cdec8a22","title":"Comparing Malicious Files","logo":null,"type":"lecture"}]},{"id":199,"image":null,"full_public_name":"Tanoy \"NoTTY\" Bose","abstract":"Tanoy Bose (handle n0tty - pronounced \"No TTY\") is a geek, cybersecurity researcher and senior security consultant. He has a few security hall of fames and a few CTF wins. He has worked on a wide range of topics in security, some of them include Red teaming, Infrastructure Pentest, Purple Teaming, Forensics and Incidence Response, Cyber Threat Intelligence, Cyber Footprint Assessment, Security Maturity Assessment, Application Penetration testing.","description":"","links":[],"events":[{"id":252,"guid":"be23d9cf-67e9-411d-aba7-38a9d4f6457b","title":"Hybrid Cloud Seeding","logo":null,"type":"lecture"}]},{"id":170,"image":null,"full_public_name":"Tonimir Kisasondi","abstract":"Security Researcher from Croatia","description":"Tonimir Kisasondi is the head of the Open Systems and Security laboratory at the Faculty of Organization and Informatics in Varazdin, Croatia, where he works since 2008. He currently likes to improve systems, usually by breaking them first. He authored multiple papers, frequently lectures on regional scientific and professional conferences. Loves coffee and good hacks. He is the organizer of FSec security symposium (http://fsec.foi.hr)","links":[],"events":[{"id":268,"guid":"7995ce89-188d-47de-bb11-9b139734ee60","title":"Tales from the hunt","logo":null,"type":"lecture"}]},{"id":152,"image":null,"full_public_name":"Udru\u017eenje \"Mejker\", Association \"Maker\"","abstract":"Makers community in Serbia","description":"Our primary job is expanding makers community in Serbia. ","links":[],"events":[{"id":274,"guid":"9d963761-231f-4b12-b69a-2fc4bc0e8b15","title":"The Things Network Novi Sad","logo":"/system/logos/274/medium/novi-sad_(1).png?1535963842","type":"other"}]},{"id":232,"image":"/system/avatars/232/medium/Thecount.png?1529312118","full_public_name":"Vanja","abstract":"Vanja Svajcer is Technical Leader at Cisco Talos Threat Intelligence organisation. ","description":"Vanja Svajcer works as a Technical Leader at Cisco Talos Threat Intelligence organisation. \r\n\r\nHe is a security researcher with more than 15 years of experience in malware research and detection development. Prior to joining Talos, Vanja worked for SophosLabs and led a Security Research Team at Hewlett Packard Enterprise. \r\n\r\nVanja enjoys tinkering with automated analysis systems, reversing binaries and Android malware. He thinks time spent scraping telemetry data for signs of new attacks is well worth the effort.\r\n\r\nIn his free time, he is trying to improve his acoustic guitar skills and often plays basketball, which at his age is not a recommended activity.","links":[],"events":[{"id":229,"guid":"de7d44f1-6d34-479b-b5e3-a5a73767e959","title":"A WinDbg full of tricks","logo":null,"type":"lecture"}]},{"id":182,"image":null,"full_public_name":"Vladan Nikolic","abstract":"Senior penetration tester, specialized in SCADA, vehicles, mobile and embedded devices security.","description":"Vladan Nikoli\u0107 has been in the IT industry for more than 20 years as an engineer, system administrator and security expert. Experience includes different infrastructure technologies (networking, linux and windows), compliance with standards (SoX, ISO27001, PCI), software development, reverse engineering, penetration testing, application and wireless security, and a rich knowledge of digital electronics enabling him to successfully tackle most complex engagements. Since 2008 Vladan has worked as security consultant for IBM Professional Security Services (now X-Force Red) taking part in various security related projects, mostly in energy, pharmaceutical, telco and finance sectors. He holds multiple industry certificates including Certified Information Systems Security Professional (CISSP) from (ISC)2, and Offensive Security Certified Expert (OSCE). He was presenter at numerous security conferences, latest of them being 2017 Recon held in Brussels.","links":[],"events":[{"id":225,"guid":"30928d1c-c32f-4405-97cd-0dba22a162a8","title":"Riding the wave","logo":null,"type":"lecture"}]},{"id":200,"image":null,"full_public_name":"Zoz","abstract":"Zoz is a hacker, robotics engineer and pyrotechnician with broad interests in software, hardware and security applications. He has taught subjects including robotics, digital fabrication, cybersecurity and ethical hacking at top international universities and as a private industry consultant. He has hosted and appeared on numerous international television shows including Prototype This!, Time Warp and RoboNationTV, and speaks frequently at prominent security and hacking conferences including DEF CON, HackCon and BruCon. He believes that your digital data is part of your human right to privacy and is yours to secure or destroy at will.\r\n","description":"","links":[],"events":[{"id":251,"guid":"e5357593-ce78-450d-bbfb-b1c23a3cedba","title":"Hacking Driverless Vehicles","logo":null,"type":"lecture"}]},{"id":87,"image":null,"full_public_name":"abakalov","abstract":"","description":"","links":[{"url":"http://mechanicalmind.org/","title":"Aleksandar Bakalov's Web Log"}],"events":[{"id":243,"guid":"13828986-7475-46a1-902c-3c26d807becd","title":"Examination for amateur radio operators of 1st and 3rd class","logo":"/system/logos/243/medium/logo-retro.png?1530363928","type":"other"},{"id":244,"guid":"a0b5ac48-a85f-45a8-8f37-f7888666fa99","title":"Amateur radio activity days","logo":"/system/logos/244/medium/logo-retro.png?1530363952","type":"meeting"},{"id":245,"guid":"8ac41c67-6c6d-422e-a17a-b36289768bf2","title":"Vintage amateur radio equipment exibition","logo":"/system/logos/245/medium/logo-retro.png?1530363968","type":"other"}]},{"id":249,"image":null,"full_public_name":"blueberry vignesh4303","abstract":"Blueberry vignesh4303, He has a few security hall of fames and a few CTF wins. He has worked on a wide range of topics in security, some of them include Red teaming, Infrastructure Pentest, Purple Teaming, Forensics and Incidence Response, Cyber Threat Intelligence, Cyber Footprint Assessment, Application Penetration testing.","description":"Pentester and just another guy whom plays around 0 and 1.","links":[],"events":[{"id":252,"guid":"be23d9cf-67e9-411d-aba7-38a9d4f6457b","title":"Hybrid Cloud Seeding","logo":null,"type":"lecture"}]},{"id":233,"image":null,"full_public_name":"bojanz","abstract":"Penetration testing team leader in INFIGO IS. SANS Internet Storm Center handler and SANS instructor.","description":"Bojan graduated in 1998 at the Faculty of Electrical Engineering and Computing, University of Zagreb. After graduation he started working in the LSS group as an associate on information security projects.\r\n\r\nAt the Faculty of Electrical Engineering and Computing, he managed and actively participated in numerous projects related to computer network planning and information systems security testing and assessment. Bojan performed forensic analysis for the Croatian CERT and was a member of several CERT IRTs (Incident Response Team). He is a long-standing author for Bug and Mre\u017e@ computer magazines and has his own security column in the magazine Mre\u017e@. He is also the author of the book \u201eWhat are the viruses and how they work?\u201c, published by SysPrint.\r\n\r\nSince 2003, he worked at the University of Auckland, New Zealand, as information security specialist, where he actively participated as IT/Security architect in numerous enterprise projects. His duties included handling of new security technologies introduced to the University as well as being a project member responsible for security on all enterprise projects. \r\n\r\nIn 2005 he became one of the handlers of SANS Internet Storm Center (ISC), a voluntary organization with a goal to detect security problems, analyze risks and distribute technical information. ISC is the most often quoted source of security information in the world today. \r\nSince 2006 Bojan works in INFIGO IS as a senior information security consultant.\r\n\r\nBojan is also teaching two SANS courses, including the most popular SEC504 (Hacker Tools, Techniques, Exploits, and Incident Handling) and SEC542 (Web App Penetration Testing and Ethical Hacking).\r\n","links":[],"events":[{"id":230,"guid":"d67dbb92-531f-49f2-9e56-3e5353e9703a","title":"Exploiting esoteric SQL injection vulnerabilities","logo":null,"type":"lecture"}]},{"id":195,"image":"/system/avatars/195/medium/19420399_1422479404479921_1522571404896470715_n.jpg?1498499737","full_public_name":"cluosh","abstract":"Software engineer and student at TU Wien, member of CTF team We_0wn_Y0u. Interests: InfoSec, GFX, Machine Learning, C++/Rust.","description":"Currently working on my bachelor's degree in software engineering at TU Wien. Working on FE-simulation and machine learning at day, reverse engineering at night. Enjoy playing CTFs as member of the We_0wn_Y0u CTF team.","links":[],"events":[{"id":241,"guid":"a2a88e0d-faf7-4930-b87b-04e463cfe930","title":"Emulating AVR from Scratch","logo":null,"type":"lecture"}]},{"id":231,"image":"/system/avatars/231/medium/images.jpeg?1528832367","full_public_name":"cypherpunk@disroot.org","abstract":"Student, security/privacy enthusiast and researcher.","description":"Member of haklab Belgrade, one of Cryptoparty Srbija founders.\r\nStill student, interested in computer science, but mostly in cryptography and how it is applied to digital security, privacy, anonymity and censorship circumvention.\r\n\r\n","links":[{"url":"https://cryptoparty.rs","title":"Cryptoparty Srbija"}],"events":[{"id":232,"guid":"5fb7f8b3-d23f-4c15-bc34-2c89ab1be053","title":"Cryptoparty","logo":"/system/logos/232/medium/9.jpeg?1529819229","type":"workshop"}]},{"id":245,"image":"/system/avatars/245/medium/mm-white-small.jpg?1531264521","full_public_name":"hackman","abstract":"","description":"","links":[{"url":"http://hydra.azilian.net/blog/my-talks/","title":"Talks"},{"url":"http://hydra.azilian.net/blog/about/","title":"Bio"}],"events":[{"id":259,"guid":"11733bbe-c352-4dfc-af75-1eb4bd07dfe5","title":" Preventing CPU side-channel attacks with kernel tracking ","logo":null,"type":"lecture"}]},{"id":163,"image":"/system/avatars/163/medium/161005_105.jpg?1532857359","full_public_name":"leyrer","abstract":"Providing IT-Wizardry for money for over 20 years. Boldly managing systems where angels fear to tread. Easily distracted by everything shiny, blinky and new. ","description":"","links":[{"url":"https://martin.leyrer.priv.at","title":"Blog"},{"url":"https://twitter.com/leyrer","title":"Twitter"}],"events":[{"id":263,"guid":"12e6decf-4a36-490c-82cf-8ce7038feee5","title":"Modern Commandline Tools V1.4 (English Edition)","logo":"/system/logos/263/medium/cli_linuxtage.jpg?1532858215","type":"lecture"}]},{"id":59,"image":null,"full_public_name":"mc.fly","abstract":"","description":"","links":[],"events":[{"id":264,"guid":"d5298b39-92cd-448a-9f0e-a1bc51fa2117","title":"automated number plate readers","logo":null,"type":"lecture"}]},{"id":213,"image":null,"full_public_name":"nemanja","abstract":"Engineer/Hacker. Over 15 years of experience in software and a decade in hardware development. Enjoys breaking cool stuff and building even cooler stuff. Spent 6 years developing electronic musical hardware. Worked as a security researcher at Berlin-based SRLabs. Currently building an AI robot control system at micropsi industries GmbH.","description":"","links":[],"events":[{"id":258,"guid":"a103f5d4-2d10-46a8-9099-1bdbe74e9487","title":"Towards the perfect cryptocurrency wallet","logo":null,"type":"lecture"}]},{"id":228,"image":null,"full_public_name":"smuggler","abstract":"Cryptoanarchist for 20 years. An operator of anonymous remailers and darknet hangouts. Author (Second Realm - Book on Strategy, The Treasure that is Privacy, Aristocracy of Action, New Age of Intelligence). Privacy extremist and crypto absolutist. Coder, admin, network cuddler. Covert communications specialist.","description":"","links":[],"events":[{"id":228,"guid":"5bd6737e-1179-4817-b777-ecd0a315f0d9","title":"Secrets and Time - how much torture can you endure until your key expires.","logo":null,"type":"lecture"}]},{"id":246,"image":null,"full_public_name":"tuxcoder","abstract":"","description":"","links":[],"events":[{"id":266,"guid":"efba1df5-0b51-47e1-a209-59381a2588b2","title":"Lock picking Workshop","logo":null,"type":"workshop"}]},{"id":250,"image":"/system/avatars/250/medium/pavol3.jpg?1535608746","full_public_name":"wilder","abstract":"Cryptoanarchist and voluntaryist focused on technology and society hacking","description":"* Cryptoanarchist and voluntaryist focused on technology and society hacking \r\n* Owner of IT security ethical hacking company Nethemba & bug bounty company \r\nHacktrophy & contemporary art creation company Satori \r\n* Co-organizer of the biggest cryptoanarchist conference in Paraleln\u00ed Polis, \r\nPrague (www.hcpp.cz) \r\n* Co-founder of Bratislava and Prague's hackerspaces \r\n* Member of Czech contemporary artistic group Ztohoven ","links":[],"events":[{"id":270,"guid":"b98bf46e-c0b4-4ba1-aa87-e880f979790a","title":"How to achieve both economic and personal freedom using globality and flexibility.","logo":null,"type":"lecture"}]}]}}