Feeds

Peek-A-Booty to debut at grassroots P2P show

Reclaiming the meme

  • alert
  • submit to reddit

Remote control for virtualized desktops

Peer-to-peer was 2000's most overused buzzword, and perhaps the only way to reclaim it is through grassroots organization.

That's what Bram Cohen thinks, anyway. Cohen worked on MojoNation before quitting last April to concentrate on his BitTorrent project, and he's convening hackers in downtown San Francisco next month for a P2P/cypherpunk conference a world away from the usual corporate trappings.

"Conferences cost a ridiculous amount of money, and hackers are treated like dirt," says Cohen.

By contrast admission to CodeCon will cost $50, with ten bucks off if you register before Friday. The rules should ensure that it's free of sociological discussions of collaborative writing, and theoretical discussions of grids, swarms or hives:-

"Everything has to have a working demo, presented by one of the implementers," Cohen tells us. "That should raise the signal to noise ration quite a bit."

The banned list encompasses "SET and other white elephant, unimplemented standards," "Mathematical cryptography lacking practical implementation" and evil DRM systems.

So there ought to be lots of detail from presenters representing the best-known P2P projects such as Gnutella, down to some "random hackers" and will be the stage for the public debut of the Cult of the Dead Cow's anonymity app Peek-A-Booty. That got a private unveiling at DefCon09 last year, which we covered here Other presentations include the Invisible IRC Project, Mnet and CryptoMail.

It's held at Jamie Zawinski's DNA Lounge nightclub - and as a bonus (well, for me, anyway) it's thoughtfully timed to coincide with my birthday. For the hackers who can't attend either of these landmark events, a webcast will be provided throughout. (Of the conference, not my birthday.) ®

Related Link

CodeCon (San Francisco 15-17 February)

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.