Confirmed Sessions

This list will be updated as more participants are confirmed.

Resisting financial surveillance with private electronic cash

  • Jen - Freedom of the Press Foundation

    Your bank knows who you pay and how much, and so does the government. Governments and third parties can surveil and censor virtually all financial transactions. We will give a technical assessment of the tools available today built for anonymous, private electronic cash: how systems like Monero and ZCash work, their anonymity and privacy guarantees, and practical considerations for the edges of these systems. This talk will leave you better equipped to reason about the tradeoffs for your threat model.

(De)constructing Atlanta's Surveillance Architecture

  • Southerners Against Surveillance Systems & Infrastructure (SASSI)

    Atlanta was selected as one of the host cities of the 2026 World Cup. We can expect this event to be used by Atlanta's elected officials and corporations to reorganize and reshape the city in ways that reinforce the interests of Atlanta's elite. This includes the expansion of existing technologies and the adoption of new ones, bolstering infrastructures of police power and standardizing the practice of policing and surveillance across Metro Atlanta. In order to understand how Atlanta's elite will use the World Cup to justify the intensification of fascist securitization, SASSI will explore how the 1996 Olympics—among other events—was used to reshape the city's surveillance architecture in service of local and federal information sharing priorities. By grounding contemporary struggles against displacement, detention, and data centers in the history of carceral information sharing, SASSI invites discussion on alternative information infrastructures and the future of abolition organizing in Atlanta and across the South.

Distributed Scanner Infrastructure and Rapid Response Loops

  • Tom Nomad

    Within anarchist circles the discussion about using emergency radio scanners has advanced dramatically over the past couple of years, with many communities now supporting a scanner listening team. While this is wonderful, listening to a scanner online or even running one on your own is only part of the story. In this workshop we will discuss ways to build distributed scanner infrastructure, with overlapping scanners serving a large metropolitan area, the development of training programs and shift organization, the building of call archives and scanner hunt teams, and ways for these structures to interact with Rapid Response networks without either compromising the security of the team or isolating them to the point of ineffectiveness and isolation.

From Israel with Love?

  • altk3y

    The year is 2026, privacy is scarce, our data is everywhere, and our phones know more about us than we do. What would someone see if they got your phone somehow? How would the data they see change if they had access to better equipment? Would you like to replicate that equipment? Can we ever leave our phones unattended again? This talk is about one of the most infamous mobile forensics devices, Cellebrite, obtaining these devices, what they can do, and how to replicate that functionality using open source projects that deserved a lot more love than they got. We’ll also take a look at how to protect yourself against these tools, the adversaries that use these tools, and the traces they leave behind when they do. Finally, we’ll look at the vulnerabilities inherent in these devices and how to get some unintended functionality from them.

The MN Rebel Loon story

  • Meredith & Alex

    Meredith and Alex share what they noticed, experienced and did in their communities and how neighbors came out in force to help at-risk neighbors. Meredith brings a do-it-yourself technical ethos and Alex brings the hands-on organizing and legal perspective from the very beginning of the response to the next generation of good-doers. Attendees will learn about the tools, strategies and methods of community support folks used during the surge. They will also have some good laughs aimed at Alex’s foibles as he tries to explain the impact of encrypted software on a movement of mostly other Alexes. Meredith will ensure that he doesn’t go too rogue. Attendees will learn about what worked and what didn’t and where tooling changes can make the biggest difference.

Troika Consulting

  • Borris and Natasha

    In this workshop we'll be teaching the Troika Consulting liberating structure in a holistic security practice. Expect to learn a framework of active listening performed with a few friends that can be applied to threat modeling, and digital security incident response. If you want to practice digital security in community without the posture of holding all the answers, this workshop is for you.