Feeds

Dutch hacker love-in faces the chop

What the Hack menaced

  • alert
  • submit to reddit

Build a business case: developing custom apps

A distinguished hackers' gathering scheduled to take place in July faces a ban by the local municipality. The mayor of Boxtel, in the Netherlands, cites "fear of breaches of law and order and danger to public safety". The organisers of What the Hack have been told they now need a permit for the event to happen.

Organiser Rop Gonggrijp, co-founder of the first ever Dutch Internet provider XS4ALL and former editor-in-chief of the 1980's hacker magazine Hack-Tic, assumes it is a misunderstanding: "The mayor seems to have a somewhat odd perception of what we, hackers, are going to do there. Yes, we think it's important that bad computer security is exposed. But computer break-ins are only a side issue for us. We are talking about grown-up hackers: The participants have been working in the computer security industry for many years." Gonggrijp said that the event has not resulted in any incidents in the past.

What the Hack usually draws 3,000 participants from all over the world. It has been running for 16 years. In 1997, visitors at the event used a legal loophole to distribute an exported copy of the PGP encryption program, forcing the US government to change its policies regarding the export of strong encryption algorithms.

This year's bash - if it happens - will feature lectures on the fight against software patents in Europe, discussions on how to use wireless technologies in developing countries, and presentations about biometric identification. ®

Related stories

Underground showdown: defacers take on phishers
Revenge motivates insider hacking attacks
Web attacks soar

Next gen security for virtualised datacentres

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?