Dive into the wild world of DEF CON through unforgettable party ideas and an innovative Twitter experiment that turned nerves into laughter. Explore the fascinating journey of Grifter, from a tech-savvy child in Long Island to a military veteran transformed by the hacker community. Discover the chaotic yet vibrant atmosphere of major hacking conferences, the delicate balance of cybersecurity, and the intriguing duality of ethical versus malicious hackers. It's a captivating exploration of identity, community, and the ever-evolving landscape of technology!
01:17:59
forum Ask episode
web_stories AI Snips
view_agenda Chapters
auto_awesome Transcript
info_circle Episode notes
question_answer ANECDOTE
Anonymous Party
At DEF CON, Jack Rhysider threw a party where everyone wore his signature disguise.
This allowed him to experience the event anonymously, even at his own party.
question_answer ANECDOTE
Twitter Takeover
Jack Rhysider let attendees control his Twitter account during the party.
Surprisingly, despite the potential for chaos, the tweets remained relatively tame.
question_answer ANECDOTE
Party Popularity
The party was so popular that over 1000 people waited in line, exceeding any previous DEF CON party.
The line was so long it rivaled the merchandise line, a notoriously long line at DEF CON.
Get the Snipd Podcast app to discover more snips from this episode
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.
Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.
Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.
This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it’s often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.