Fact-checked by Grok 2 weeks ago

DEF CON

DEF CON is an annual hacker convention held in , , founded in 1993 by under the pseudonym Dark Tangent as a gathering for members of a network. The event serves as a primary forum for computer security enthusiasts, researchers, and professionals to exchange knowledge on techniques, exploitation, and defensive measures through informal presentations, hands-on workshops, and competitive challenges. Central to DEF CON are its signature contests, including the (CTF) competition, which originated at the event and remains one of the oldest and most prestigious contests, pitting teams against complex network and software puzzles to simulate real-world penetration testing. Specialized "villages" provide dedicated spaces for practical demonstrations in subfields such as , lockpicking, and social engineering, fostering skill-building and innovation among attendees estimated in the tens of thousands. The conference's influence extends to shaping cybersecurity practices, with outcomes from its demonstrations often highlighting systemic flaws in technology and , though its unfiltered environment has occasionally drawn federal investigations into participant activities. DEF CON's system, featuring custom hardware collectibles that double as tools, underscores its emphasis on tangible, creative engagement over corporate sanitization.

History

Founding and Early Years

DEF CON was founded by , known by the handle Dark Tangent, in 1993 as an informal gathering for members of online communities he participated in, including a farewell event for a friend exiting the scene from the Platinum Net network. The inaugural DEF CON 1 occurred from June 9 to 11, 1993, at the Sands Hotel & Casino in , , drawing approximately 100 attendees focused on technical discussions rather than commercial or institutional agendas. Presentations at the event covered emerging security concerns, including Dan Farmer's announcement of the Security Administrator Tool for Analyzing Networks (SATAN), a scanning ; Mark Ludwig's talk on virus development; and sessions on , computer privacy, and . These early talks emphasized practical demonstrations and knowledge sharing among participants from the hacker , without formal vetting or corporate sponsorship.%20-%20Audio.m4b) In its initial years, DEF CON expanded modestly but steadily, with DEF CON 2 held July 22–24, 1994, at the Sahara Hotel and Casino, attracting around 200 participants and introducing more structured elements like contests. Subsequent editions shifted to larger venues, such as the Tropicana Hotel for DEF CON 3 (August 4–6, 1995) and the Monte Carlo Resort for DEF CON 4 (July 26–28, 1996), reflecting growing interest from security researchers and enthusiasts amid rising public awareness of cyber threats. This period solidified the convention's reputation as a for unfiltered discourse on vulnerabilities and defenses, distinct from government or industry-controlled events.

Expansion in the 2000s

During the , DEF CON transitioned from a niche underground gathering to a major annual event, with attendance surging into the thousands. DEF CON 8, held July 28–30, 2000, at the Alexis Park Resort in , drew more than 4,000 participants, reflecting sustained growth from its earlier years as a small hacker party. This scale-up was accompanied by heightened media scrutiny and the presence of U.S. Defense Department representatives, signaling the convention's emerging role as a venue for both adversarial demonstrations and discussions. Organizers adapted to the larger crowds by repurposing spaces like the DJ room for daytime presentations, underscoring logistical challenges from rapid expansion. The program's diversification contributed to this growth, with an increasing emphasis on specialized contests and technical demonstrations. By DEF CON 12 in 2004, events included the Shootout, where global enthusiasts competed in long-range wireless signal challenges, highlighting the convention's adaptation to emerging technologies like widespread adoption. (CTF), formalized since in 1996, evolved further with more structured judging and international team participation, solidifying its status as a premier competition that drew skilled competitors and observers. These additions attracted a broader , including security professionals, while maintaining the core ethos of hands-on vulnerability exploration and knowledge sharing. By the late 2000s, DEF CON's scale prompted venue shifts to accommodate demand, such as moving to the Riviera Hotel & Casino for DEF CON 16 in 2008, which hosted expanded talks on topics like network attacks and social engineering. The event's reputation for unfiltered disclosures—often preceding vendor patches—fostered its growth amid rising cybersecurity awareness post-dot-com bust and early enterprise network threats. This period also saw greater corporate and engagement, though the community retained its independent, countercultural edge, prioritizing open technical exchange over commercial agendas. Overall, the established DEF CON as the de facto gathering for the infosec world, with attendance and programming reflecting the field's maturation.

Maturation and Institutionalization in the 2010s

During the , DEF CON underwent significant expansion, with attendance growing from approximately 10,000 at DEF CON 18 in 2010, hosted at the Riviera Hotel & Casino, to around 16,000 by DEF CON 22 in 2014. This surge prompted logistical adaptations, including a venue shift to the larger Rio All-Suite Hotel and Casino starting in 2011, where participation reportedly reached 17,000. By mid-decade, crowds stabilized at 18,000 to 22,000 annually, reflecting broader interest from professionals amid rising cybersecurity awareness. A key development was the proliferation of villages—dedicated, community-driven zones for specialized activities—which formalized niche explorations and hands-on demonstrations. The Social Engineering Village debuted at DEF CON 18 in 2010, offering structured training in techniques relevant to . Subsequent years saw additions like the Lock Picking Village by DEF CON 23 in 2015, emphasizing challenges. These villages enhanced organizational depth, enabling parallel programming tracks while preserving decentralized, volunteer-led operations. This period marked a shift toward greater institutional maturity, with expanded programming encompassing advanced contests like evolving events and themed workshops on emerging threats such as systems and mobile vulnerabilities. Corporate and attendees increased, blending with professional networking, yet the conference maintained its independence under founder (Dark Tangent), avoiding formal corporate sponsorships or centralized governance. Such changes balanced scale with core principles, though critics noted strains on the event's original underground ethos from overcrowding and commercialization pressures.

Recent Developments and Shifts (2020s)

The prompted significant adaptations for DEF CON in 2020, with organizers canceling the in-person DEF CON 28 event originally scheduled for August 6–9 in and shifting to a fully "" format, which was offered free to all participants to ensure broad accessibility amid health uncertainties. In 2021, DEF CON 29 adopted a hybrid model, blending sessions with limited in-person elements, reflecting ongoing caution while attempting to restore community engagement disrupted by the crisis. DEF CON resumed primarily in-person operations with DEF CON 30 in August 2022, themed "Hacker Homecoming" and held semi-hybrid at the Las Vegas Convention Center from August 11–14, marking a return to large-scale physical gatherings after two years of pandemic constraints, though with updated protocols including masking recommendations in certain areas. This shift facilitated renewed emphasis on hands-on villages and contests, but highlighted logistical strains from surging attendance, as the event's scale continued to expand into the tens of thousands. Throughout the decade, villages evolved to address emerging threats, with the AI Village gaining prominence for workshops on artificial intelligence's dual role in offensive tools like automation and defensive strategies, alongside simulations of adversarial attacks. The Voting Village, active since 2017, intensified focus on election infrastructure vulnerabilities, hosting demonstrations of exploits and symposia countering , particularly relevant post-2020 U.S. elections and ahead of 2024 cycles, where researchers identified flaws in systems from multiple vendors without real-world deployment risks. Newer additions like ship hacking sessions at DEF CON 33 in 2025 underscored growing attention to , including maritime systems amid geopolitical tensions. Organizational adjustments included enhanced transparency reporting on convention incidents since prior years, extending into the to address attendee safety and . However, scale-related challenges surfaced, such as the badge production controversy, where overbudget costs exceeding 60% led to a stop-work order on a preproduction vendor amid disputes over charges, prompting debates on and . By 2025, DEF CON refined group sanctioning processes to streamline village operations and reduce administrative burdens, aiming to sustain growth while managing complexity. These developments reflect a broader maturation, balancing autonomy with practical amid heightened scrutiny on cybersecurity's societal impacts.

Event Components

Core Schedule and Activities

DEF CON's core schedule spans four days, typically through in , with initial registration and badge distribution on morning at designated hotels or convention centers in . Badges, required for entry to talks and events, are collected in person and often feature interactive hardware elements. Activities intensify on , with formal programming running through . The daily structure centers on technical presentations and talks delivered in multiple parallel tracks, commencing at 10:00 AM and extending to 17:30 or later. These include main speaking tracks and specialized stages like the Creator Stage, where security researchers present findings on topics such as vulnerabilities, , and system exploits. Sessions occur every 30 minutes to an hour, enabling attendees to navigate between tracks based on interest, though overlap requires prioritization. The opening event features a welcome address by founder , known as The Dark Tangent. Hands-on workshops and demo labs supplement talks, offering practical sessions on tools and techniques, often with limited seating and prior registration. Evenings transition to social and entertainment activities, including parties, music performances, and informal meetups that facilitate networking among hackers, professionals, and enthusiasts. These extend late into the night, contrasting the structured daytime agenda and contributing to the event's informal, community-driven atmosphere. The schedule concludes Sunday afternoon, followed by optional post-event training.

Villages and Themed Areas

Villages at DEF CON constitute specialized, community-driven zones that provide immersive environments for hands-on exploration of particular disciplines, including workshops, demonstrations, and capture-the-flag-style challenges tailored to niche topics. These areas operate semi-autonomously within the convention, allowing organizers to curate activities that emphasize practical skills over passive lectures, often featuring equipment loans, live sessions, and knowledge exchange. Villages emerged as a core component of DEF CON's structure in the mid-2000s, evolving from informal gatherings to formalized spaces that attract dedicated subcommunities and contribute to the event's reputation for fostering technical innovation in cybersecurity. Prominent villages cover diverse domains, such as , communications, and biological interfaces. The Lockpicking Village, for instance, offers tools and training for bypassing mechanical locks, picks, and related hardware, promoting skills in physical penetration testing that have influenced professional and security auditing practices. Similarly, the Hardware Hacking Village concentrates on embedded systems, circuit board analysis, and device extraction, providing soldering stations and components for attendees to prototype exploits or custom gadgets. Other established villages target digital and interdisciplinary threats. The Wireless Village specializes in radio frequency protocols, spectrum analysis, and applications, with activities including signal interception and custom antenna builds to demonstrate vulnerabilities in and cellular networks. The Biohacking Village examines intersections of biology and technology, featuring demos, implantable device security tests, and ethical discussions on genetic data privacy, drawing from advancements in . The Car Hacking Village focuses on automotive electronics, such as and keyless entry flaws, with real-vehicle teardowns that have informed industry standards for connected vehicles.
VillageFocus AreasKey Activities
AI VillageArtificial intelligence security, machine learning vulnerabilitiesModel poisoning workshops, adversarial AI demos
Blue Team VillageDefensive cybersecurity, incident responseDefensive CTF challenges, threat hunting simulations
Adversary VillageRed team tactics, emulation of advanced persistent threatsPurple team exercises, supply chain attack simulations
Villages typically align with DEF CON's annual schedule, operating during core con hours—Friday and Saturday from 10:00 to 18:00, and Sunday until 14:00—and remain accessible to all badged attendees without additional fees, though some require pre-registration for limited resources. Their decentralized model encourages innovation but can lead to variability in content quality, with community feedback driving iterations across conferences. This structure has enabled villages to influence broader discourse, such as by highlighting zero-day flaws in consumer hardware or protocol weaknesses through public disclosures.

Badges, Handles, and Participant Identification

DEF CON badges function as both entry credentials and interactive hardware artifacts central to participant engagement. Typically designed as printed circuit boards (PCBs) with artistic elements and embedded electronics, these badges have evolved since the early to include features like LEDs, RFID chips, and programmable components that attendees hack, modify, or compete with during the event. For instance, the DEF CON 16 badge incorporated infrared-based capabilities between attendees, while later iterations featured multiplayer games or elements like watches. This "badgelife" subculture has spawned communities dedicated to badge design, , and custom gadgets, extending beyond official releases to unofficial variants produced by attendees. Participant identification at DEF CON prioritizes pseudonymity to preserve , a core tenet of . Attendees adopt "handles"—unique nicknames or aliases—instead of real names for all interactions, presentations, and networking, providing an additional layer of against tracing. This practice, rooted in historical traditions, discourages the use of legal identities within the conference environment, with some participants further enhancing privacy through disguises like masks or fake beards. While badge scans or ticket purchases may involve verifiable for and legal compliance, such information remains undisclosed in public discourse or event activities, reinforcing the event's emphasis on operational over traceability. Handles facilitate social and competitive dynamics without compromising privacy, often becoming long-term identifiers in the cybersecurity community. For example, prominent figures like the event founder are known exclusively by handles such as "Dark Tangent" in conference contexts. This system contrasts with more formalized professional events, as DEF CON's structure actively resists real-name policies to mitigate risks like doxxing or , though evolving external pressures from and corporate attendance have prompted debates on balancing with accountability. Badges often incorporate spaces or digital fields for personalizing with handles, integrating identification seamlessly into the hardware ecosystem.

Workshops, Talks, and Fundraising Mechanisms

DEF CON features a variety of talks delivered across multiple tracks, including main speaking tracks and specialized stages such as the Creator Stage, where experts present on topics ranging from cybersecurity vulnerabilities to novel techniques. These presentations are scheduled over the core days of the event, typically spanning through Sunday, with sessions starting as early as 10:00 AM and continuing into the evening. Recordings of talks from past conferences, such as DEF CON 33, are archived on the official for public access, preserving content like demonstrations of social engineering tactics enhanced by tools. Workshops at DEF CON emphasize practical, hands-on learning, often integrated into villages or dedicated sessions where participants engage with tools, simulations, and challenges. For instance, villages like the Adversary Village host scheduled workshops on topics such as adversary emulation and red teaming, with sessions allocated specific time slots across multiple days. Similarly, the Payment Village offers workshops on security, including emulating magstripe technologies, complementing broader village activities like talks and contests. These workshops differ from standard presentations by focusing on interactive demos and skill-building, such as approaching CTF-style challenges distinct from real-world hacking. Fundraising at DEF CON primarily occurs through charity auctions tied to badge contests, where participants create custom badge replicas, and winning entries are auctioned to benefit organizations like Hackers for Charity. This mechanism leverages attendee creativity to generate proceeds, with auctions emphasizing detail and innovation in badge designs. Event organizers also discuss donation strategies publicly, allocating funds transparently to community initiatives after covering operational costs like setup. These efforts support the volunteer-driven nature of the conference, directing revenue toward hacker community projects rather than institutional overhead.

Contests and Challenges

Capture the Flag Competitions

(CTF) competitions at DEF CON originated in 1996 during , establishing the event as one of the earliest formalized cybersecurity contests. Initially structured with judges awarding points for exploits against flexible targets, the format evolved from chaotic early iterations to a more organized attack-defense model by DEF CON 10 in 2002, incorporating custom services on platforms like 6.2 and limiting participation to eight teams. Early winners included the AJ Reznor goons in 1996 and 1997, followed by the Ghettohackers' dominance from 1999 to 2001, with subsequent victors like Shellphish in 2005 and Vedagodz in 2009 highlighting the growing sophistication of participating teams. The core format of DEF CON CTF finals employs an attack-defense structure, where teams of 5-10 members defend a shared of vulnerable services—such as applications, cryptographic modules, and custom binaries—while launching exploits against identical setups on opponents' to capture hidden flags verifying successful compromises. Rules prohibit denial-of-service attacks, exploitation of administrative infrastructure or hypervisors, and sharing of flags or exploits, enforcing within an isolated game environment typically hosted in a like the Mezzanine. Challenges span , vulnerabilities (e.g., ), and remote code execution, with organizers like the Nautilus Institute automating scoring and concealing layouts in recent years to prevent preemptive preparations. Qualification occurs via an online event in spring, adopting a Jeopardy-style format of independent puzzle-solving across categories like forensics and , drawing hundreds of teams—such as 586 in one prior year—with the top performers advancing alongside select invitees to . feature 10-15 teams competing over two to three days, with adaptive scoring in qualifiers decreasing point values based on solve frequency (starting at 500 points). In the finals, teams earn attack points for each successful against rivals (scaled by the number of affected teams in timed rounds) and defense points for maintaining service uptime, often visualized in real-time via public scoreboards and streams like LiveCTF. Prizes emphasize prestige over monetary rewards, with victors receiving black badges for lifetime DEF CON access and recognition as hackers, though the primary incentive remains competitive dominance. Notable repeat champions include Carnegie Mellon University's Plaid Parliament of Pwning (PPP), which secured its ninth title at DEF CON 33 in August 2025, and the Maple Mallard Magistrates, who won DEF CON 30 and 31 with scores exceeding 6,000 points. These competitions have influenced broader CTF standards, promoting hybrid formats and rigorous qualification to filter talent.

Black Badge and Elite Recognition

The Black Badge constitutes one of the most prestigious awards at DEF CON, granted exclusively to individuals or teams demonstrating exceptional skill in designated elite competitions. These contests, often including variants of (CTF) and other high-difficulty challenges, evaluate participants' abilities in exploiting vulnerabilities, , and strategic defense under time constraints. Organizers designate specific events as Black Badge-eligible, with awards determined by unbeaten performance or top rankings, as outlined in DEF CON's official policy. Recipients receive lifetime free admission to all future DEF CON conferences, a benefit that enhances the badge's value amid rising attendance fees and logistical demands. The award serves as a formal recognition of elite technical proficiency, distinguishing holders in professional cybersecurity circles where practical hacking expertise often outweighs formal credentials. For instance, in DEF CON 30 (2022), teams like secured Black Badges through CTF victories, highlighting the competitive intensity required. A public Hall of Fame maintains records of Black Badge winners, preserving their contributions and fostering a legacy of innovation within the hacker community. While not every CTF or yields a Black Badge—decisions rest with DEF CON leadership based on event caliber—the designation underscores causal links between demonstrated prowess and broader impacts, such as advancing vulnerability disclosure practices. Controversial raffles or post-event distributions have occasionally sparked attendee on , though core awards remain tied to merit-based outcomes.

Domain-Specific Challenges

DEF CON villages host specialized challenges that target vulnerabilities in niche domains, complementing the broader competitions by emphasizing hands-on exploitation in areas like , industrial systems, and . These events, often structured as CTFs or timed contests, draw participants to dissect real-world technologies, such as or cloud infrastructures, fostering skills in , forensics, and protocol analysis. At DEF CON 33 in August 2025, over 70 villages operated, many featuring such domain-tailored activities that award points, badges, or prizes based on successful breaches. The Hardware Hacking Village CTF exemplifies physical and embedded systems challenges, requiring competitors to employ soldering, debugging, and extraction on custom devices during sessions from 10:00 to 18:00 on Friday and Saturday. Participants tackle tasks like bypassing hardware protections or exploiting microcontrollers, with resources provided onsite for prototyping attacks. Industrial control systems (ICS) challenges in the ICS Village CTF simulate attacks on , involving protocol manipulation, system intrusions, and reprogramming to disrupt virtual plants or extract data. Held via platforms like CTFd, these contests highlight vulnerabilities in , with teams competing to identify and exploit flaws in emulated environments. Physical security domains feature contests like those in the Lockpicking Village and warl0ck gam3z CTF, where participants race to defeat locks, safes, and entry mechanisms using tools such as picks, decoders, and impression techniques, often incorporating on associated . These hands-on trials test mechanical weaknesses and hybrid phys-digital bypasses, with challenges escalating from basic padlocks to high-security models. IoT-focused challenges in the Village include live bug hunting and CTFs targeting device , protocols, and supply chain flaws, awarding Black Badges for top performers across four rounds. Competitors reverse-engineer smart devices, exploit or stacks, and demonstrate remote compromises, underscoring pervasive risks in consumer and enterprise ecosystems. Cloud security contests, such as the Cloud Village's Jeopardy-style CTF spanning 2.5 days, challenge teams to breach multi-provider infrastructures (e.g., AWS, ) through misconfiguration exploits, escalations, and serverless function hijacks, with categories progressing in difficulty to mimic enterprise-scale threats. Other domains include in the Car Hacking Village CTF, probing protocols and firmware for takeover simulations, and in the Password Village, evaluating hash-breaking tools against modern defenses like or Argon2. These specialized events not only reveal domain-specific weaknesses but also drive vendor patches through disclosed findings.

Communities and Participants

Attendee Profiles and Culture

DEF CON attracts a diverse array of participants, including cybersecurity professionals, ethical hackers, software engineers, IT specialists, and blue team operators, chief information security officers (CISOs), and officials. Attendance has grown significantly, exceeding 30,000 individuals in recent years, encompassing both seasoned experts and newcomers from around the world. Students and academics also participate, often through programs, alongside independent researchers and technology enthusiasts. The attendee base reflects a blend of employees, representatives, and hobbyists, with historical inclusion of agents despite occasional restrictions on their attendance. This mix fosters interactions across skill levels and affiliations, from ethical hackers focused on responsible to policymakers engaging in roundtables. While corporate and presence has increased, the core remains rooted in independent and community-driven participants who prioritize technical curiosity over institutional agendas. DEF CON's culture embodies "hacker summer camp," characterized by an informal, vibrant atmosphere that combines intense technical exploration with social camaraderie. It emphasizes collaboration, knowledge sharing, and hands-on experimentation in villages, contests, and workshops, promoting values like openness, deep system understanding, and ethical investigation. The event features late-night parties, movie screenings, and networking, but maintains a focus on substantive discussions and innovation, often countering overly commercialized events. This environment encourages mutual respect among diverse attendees, though it can overwhelm first-timers due to its scale and intensity.

Affiliated Groups and Networks

DEF CON supports a decentralized network of local chapters called DEF CON Groups, which operate as independent communities of cybersecurity practitioners, hackers, and technology enthusiasts in various cities worldwide. These groups, often identified by a "DC" prefix followed by a numeric code derived from regional area codes or other locators (e.g., DC702 for or DC907 for ), organize regular meetups, skill-sharing sessions, and events to sustain hacking culture between annual conferences. As of 2025, active DEF CON Groups span multiple U.S. states and international locations, including DCG , DC757 (, ), DCG , and DC35321 (, ). The groups emphasize , with participants contributing to local cybersecurity and research without direct financial oversight from the central DEF CON organization, though they align with its ethos of sharing. Local chapters like DC702 host pre- and post-conference gatherings, such as casual meetups during DEF CON events, to build continuity in the community. Beyond local chapters, DEF CON intersects with broader hacker networks through informal ties to international organizations like the in , where members frequently participate in DEF CON activities and share techniques via cross-event collaborations, though no formal affiliation exists. These connections facilitate knowledge exchange but remain ad hoc, relying on individual attendees rather than institutional partnerships. DEF CON Groups also integrate with virtual communities, such as DEF CON Groups , offering online spaces for remote participation in discussions and simulations.

Cybersecurity Impact

Vulnerability Discoveries and Fixes

DEF CON has facilitated numerous vulnerability disclosures through its villages, contests, and presentations, often leading to vendor patches and improved security practices. Participants in specialized villages, such as the Car Hacking Village and IoT Village, demonstrate exploits on real-world devices, prompting manufacturers to issue fixes. For instance, in 2015, researchers at the Car Hacking Village remotely exploited a Jeep Cherokee's systems via its Uconnect infotainment unit, hijacking controls over cellular networks; responded by recalling 1.4 million vehicles and deploying a software within days. Similarly, addressed vulnerabilities in its Modicon M340 programmable logic controllers (PLCs) disclosed at DEF CON 23 in 2015, which allowed attackers to modify code and disrupt industrial processes; the company released firmware updates to mitigate remote code execution risks. In the realm of consumer software, a researcher at DEF CON 30 in 2022 disclosed two high-severity vulnerabilities in 's macOS client (CVEs 2022-28762 and 2022-29217), enabling via malicious Meeting SDK plugins; Zoom patched these flaws in version 5.11.0 shortly after, confirming the issues allowed local without user interaction. Village demonstrations at DEF CON 26 in 2018 exposed flaws in election systems, including weak administrator passwords and unencrypted ballot data on machines from vendors like Diebold and ES&S; while immediate patches varied, the disclosures influenced U.S. election security reforms, such as enhanced federal guidelines for verifiable paper trails. More recent efforts include the 2023 disclosure by researchers at DEF CON 31 of vulnerabilities in software like Schneider Electric's EcoStruxure and ' Desigo, which could enable remote denial-of-service attacks on ; vendors issued advisories and patches to address the flaws in web interfaces and authentication mechanisms. DEF CON's emphasis on responsible , often coordinated through villages' programs, has accelerated fixes, though challenges persist with legacy systems in sectors like and , where villages highlight unpatched exploits without always yielding public patches due to proprietary constraints. These activities underscore DEF CON's role in bridging offensive with defensive remediation, though efficacy depends on vendors' responsiveness and the absence of legal barriers to .

Policy and Infrastructure Advancements

The DEF CON Voting Village, initiated in 2017, has exposed systemic vulnerabilities in U.S. election infrastructure, including remote code execution on voting machines from multiple vendors within two hours of the event's start in its inaugural year. These demonstrations, replicated annually, revealed persistent issues such as unpatched flaws dating to in machines used across states, prompting congressional attention and advocacy for risk-limiting audits and paper ballot requirements. While direct legislative causation remains debated, the village's findings informed the U.S. House's passage of the Secure Elections Act in 2018, mandating paper records and audits, and contributed to federal guidance from the emphasizing auditable systems. In domains, the DEF CON project, launched in 2024 by DEF CON organizers in partnership with the University of Chicago's Cyber Policy Initiative and the National Rural Water Association, deploys hackers to test and fortify water utility systems against nation-state threats from actors like and . By August 2025, participants identified exploitable weaknesses in industrial control systems across multiple U.S. utilities, yielding a "Hackers " resource for policymakers to prioritize defenses like and . This initiative addressed resource constraints in underfunded sectors, with early adopters like , implementing hacker-recommended patches to enhance remote access controls and firmware integrity checks. Policy @ DEF CON, formalized as a dedicated track by 2023, bridges technologists and government officials through panels on vulnerability disclosure and regulatory frameworks, fostering collaborations that influenced discussions on privatizing elements of the program for greater stability amid federal funding uncertainties. Complementing this, the 2025 AI Cyber Challenge at DEF CON 33, backed by executive directives under President Trump, tested AI-driven tools for automated threat detection, advancing infrastructure resilience by integrating open-source models into national defense protocols. These efforts underscore DEF CON's role in translating adversarial testing into actionable standards, though implementation lags due to interagency coordination challenges.

Broader Industry and Research Influences

DEF CON has shaped cybersecurity research by providing a venue for disclosing vulnerabilities that often inform subsequent peer-reviewed studies and industry benchmarks. Demonstrations in specialized villages, such as the Voting Village established in 2017, have exposed flaws in electronic voting machines from vendors like Election Systems & Software (ES&S), leading to detailed reports that document exploitable weaknesses in voter check-in systems and ballot marking devices, thereby influencing academic analyses of election integrity. Similarly, the annual Hackers' Almanack compiles findings from DEF CON contests, including critical vulnerabilities in mobile voting products and physical security systems, which researchers reference to advance studies on supply chain risks and access controls. The conference drives industry standards through its emphasis on practical, adversarial testing, exemplified by disclosures at events like DEF CON 33, where researchers revealed remote paths in systems, prompting vendors like Trustonic to enhance root-of-trust mechanisms. Contests promoting responsible disclosure, such as those in and villages, have accelerated remediation timelines; for example, -driven vulnerability hunting has been shown to shorten patching from discovery to fix, contrasting with slower sectors like healthcare where averages exceed 400 days. Initiatives like the DEF CON Franklin project, launched to secure U.S. utilities, recruit ethical hackers for ongoing assessments, yielding volunteer networks and resources that bridge research gaps in defense against state-sponsored threats. These efforts extend to AI red-teaming challenges, where participants identify prompt injection flaws in large language models, spurring industry-wide adoption of defensive tools and highlighting empirical advantages for defenders over attackers in emerging domains.

Controversies and Criticisms

Organizational and Logistical Failures

In February 2024, abruptly terminated its 25-year contract with DEF CON for the 32nd conference, citing a strategic change unrelated to the event's conduct, forcing organizers to secure the Las Vegas Convention Center as an alternative venue just months before the dates. This incident exposed vulnerabilities in venue contracting reliability, as DEF CON staff had to rapidly pivot logistics including distribution and workshop arrangements to accommodate over 30,000 expected attendees. The production of DEF CON 32 badges, priced at $460 each and based on Pico 2 hardware with a emulator, overrun the budget by more than 60%, leading to a stop-work order and heated disputes with hardware designer Entropic Engineering and volunteer firmware developer Dmitry Grinberg. Organizers accused the team of unauthorized modifications, including Grinberg's addition of an displaying Entropic's logo and a request after credits were removed; in response, Grinberg was physically escorted from a badge presentation during the event. Similar and shipping plagued badge distribution in 2023, contributing to attendee frustration over pre-registration processes. DEF CON's annual transparency reports document persistent logistical shortcomings, including multiple falling ceilings at venues in and 2019, unsecured doors in 2024, and recurring accessibility complaints such as difficulties for attendees with disabilities navigating crowded spaces or villages in 2022 and 2024. Emergency responses have also faltered, with instances like a fire evacuation due to an unattended package in 2023 and staff handling mistaken registration inquiries overwhelming operations in 2022. These issues underscore organizational strains from rapid growth and decentralized event management across multiple sites.

Ethical Debates on Hacking Practices

The DEF CON Ethics Village, introduced around DEF CON 26 in 2018, serves as a dedicated forum for examining ethical challenges in , highlighting the field's lack of codified professional standards akin to those in or . Panels and presentations address practitioner responsibilities, including the moral obligations of in vulnerability handling and technology deployment. For example, discussions explore dilemmas faced by contributing to open-source tools that adversaries might repurpose for malicious ends, underscoring tensions between advancing defensive capabilities and unintended proliferation of offensive techniques. A central debate revolves around vulnerability disclosure practices, pitting full public disclosure—often exemplified by DEF CON's live demonstrations—against coordinated responsible disclosure. Proponents of full disclosure argue that rapid, transparent revelation compels vendors to prioritize fixes, as evidenced by historical DEF CON talks like Barnaby Jack's 2010 ATM jackpotting demo, which exposed exploitable flaws and influenced industry hardening. Critics, however, contend that such immediacy equips attackers with actionable exploits before mitigations, potentially exacerbating real-world harms; this view gained traction in critiques of DEF CON's Voting Village, where 2017 and 2018 hacks on election systems revealed ballot secrecy compromises but drew vendor accusations of aiding foreign adversaries by publicizing unpatched methods. Further contention arises over offensive practices like "hack back" retaliation, debated in Ethics Village sessions as a potential necessity against persistent threats from state actors, such as , despite legal prohibitions under frameworks like the U.S. . Advocates frame it as pragmatic when defensive measures fail, citing empirical inefficacy of passive strategies against asymmetric attackers, while opponents highlight risks of , misattribution, and erosion of norms. These discussions reflect broader causal realities: knowledge at DEF CON yields dual-use outcomes, driving cybersecurity advancements—such as post-Jeep recalls in 2015—but also enabling misuse absent robust constraints. Security researchers at the conference often emphasize empirical over vendor assurances, prioritizing systemic over deferred disclosures that may delay fixes.

Geopolitical Alignments and Alienation

DEF CON's hacker-centric ethos, rooted in skepticism toward centralized authority, has historically fostered tensions with governments, particularly during periods of heightened surveillance revelations. In July 2013, amid fallout from Edward Snowden's disclosures on NSA programs, organizers requested that U.S. federal employees, including and intelligence personnel, refrain from attending DEF CON 21 to allow open discourse without perceived intimidation. This stance reflected broader alienation within the community from state surveillance apparatuses, echoing principles of privacy and autonomy over institutional oversight. Despite such frictions, DEF CON has pursued pragmatic alignments with U.S. government entities on specific cybersecurity challenges, bridging countercultural roots with imperatives. The annual Voting Village, launched in 2017, collaborates with election officials and vendors to expose vulnerabilities in voting systems, influencing policy like enhanced machine testing protocols ahead of U.S. elections. Similarly, in 2023, the partnered with DEF CON for the largest public red-teaming exercise on biases, involving hundreds of attendees to probe large language models for flaws. These initiatives position DEF CON as a contributor to U.S.-led defensive postures against cyber threats, including state-sponsored actors. Geopolitically, DEF CON's U.S.-based operations and participant demographics align it with Western interests, drawing scrutiny over foreign espionage risks. U.S. officials have expressed concerns about attendees from adversarial nations like China and Russia, who could exploit the conference for intelligence gathering on vulnerabilities or networking. In 2014, amid escalating U.S.-China cyber tensions, agencies considered measures to restrict Chinese hackers' participation, citing patterns of economic espionage. Recent events, such as 2025 demonstrations on maritime hacking amid Indo-Pacific rivalries, underscore DEF CON's implicit embedding in U.S. strategic priorities. This evolution has alienated segments of the global hacker community wary of institutional co-optation. Critics, including former insiders, argue that partnerships with defense contractors and military entities erode DEF CON's purity, transforming it into an extension of empire rather than independent . Such alignments risk estranging international participants from non-aligned or adversarial states, where attendance may invite domestic repercussions, while reinforcing barriers against state-affiliated actors perceived as threats.

Venues, Attendance, and Logistics

Historical Venues and Event Timing

DEF CON has been held exclusively in , , since its inception as the primary annual gathering for the hacker community. The first edition, DEF CON 1, took place from June 9 to 11, 1993, at the , which has since been demolished. This initial event drew approximately 100 attendees and featured informal presentations and networking in a single hotel setting. Early subsequent conferences followed a similar model, utilizing individual properties to accommodate growing participation, such as the Sahara Hotel and Casino for DEF CON 2. As attendance expanded into the thousands, venues shifted to larger or multiple hotel-convention combinations to handle contests, villages, and talks. For instance, DEF CON 11 in 2003 designated the Alexis Park Resort as the official host hotel. DEF CON 15 in 2007 was centered at the Riviera Hotel and Casino. Mid-2010s events often spanned Paris Las Vegas and Bally's, as with DEF CON 23 from August 6 to 9, 2015. By the late 2010s and 2020s, the scale necessitated distributed setups across several Caesars Entertainment properties, including DEF CON 27 from August 8 to 11, 2019, at Paris, Bally's, Flamingo, and Planet Hollywood.
DEF CON EditionDatesPrimary Venue(s)
1 (1993)June 9–11Sands Hotel and Casino
11 (2003)August 8–10Alexis Park Resort
15 (2007)August 3–5Riviera Hotel and Casino
23 (2015)August 6–9Paris and Bally's
27 (2019)August 8–11Paris, Bally's, Flamingo, Planet Hollywood
30 (2022)August 11–14Caesars Forum, Flamingo, LINQ, Harrah's
31 (2023)August 10–13Caesars Forum, Flamingo, LINQ, Harrah's
32 (2024)August 8–11Las Vegas Convention Center West Hall, Sahara Hotel
Event timing has evolved from the inaugural mid-June weekend to a consistent four-day Thursday-to-Sunday format in late summer, predominantly early to align with post-Black Hat scheduling and seasonal travel patterns. This structure facilitates extended programming, including goons (volunteer staff) setup on Wednesday and teardown post-Sunday. Exceptions include occasional late-July slots, such as DEF CON 25 from July 27 to 30, 2017, to avoid calendar overlaps. The Las Vegas location persists due to its infrastructure for large crowds, options, and historical ties, despite logistical strains from hotel security and .

Attendance Patterns and Scale

DEF CON began modestly in 1993 with approximately 100 attendees at its inaugural event in , organized by as an informal gathering of hacker friends. Attendance grew rapidly in subsequent years, reflecting increasing interest in cybersecurity and culture; by 2014, the conference drew about 15,000 participants. This expansion accelerated, with DEF CON 24 in 2016 reporting over 22,000 attendees—a 46% increase from the prior year—driven by broader mainstream awareness of cybersecurity threats and the event's reputation for technical depth. By 2019, attendance reached an estimated 30,000 for DEF CON 27, establishing the conference as the world's largest annual hacking event and earning recognition in the for its longevity and scale. Post-pandemic recovery saw stabilization around this figure, with DEF CON 32 in 2024 attracting 28,000 attendees amid venue changes to the Las Vegas Convention Center, though daily peaks exceeded 35,000 due to high-density programming. DEF CON 33 in 2025 projected over 30,000 participants, representing professionals, researchers, and enthusiasts from more than 60 countries, underscoring a plateau after decades of growth influenced by digital threats, industry maturation, and global participation. The event's scale manifests in extensive demands, including multiple hotels, dedicated halls, and parallel tracks for villages, contests, and talks, accommodating a diverse crowd that includes software engineers, officials, and hackers. Average annual attendance of 30,000 highlights its dominance in the infosec calendar, outpacing predecessors like early iterations that fit into single venues, though growth has prompted logistical shifts to manage overcrowding without official caps on tickets. This pattern of exponential early expansion followed by sustained high volume reflects DEF CON's evolution from niche to global benchmark for vulnerability disclosure and knowledge exchange.

Logistical Challenges and Adaptations

The in , from smaller gatherings in its to over 25,000 participants by DEF CON 25 in 2017, has strained venue capacities and amplified overcrowding issues across multiple sites. Held annually in late July or early August, DEF CON coincides with Las Vegas's peak summer heat, often surpassing 100°F (38°C), which poses risks including for attendees traversing between venues outdoors. Registration and badge pickup processes frequently result in extended lines, compounded by uncertainties such as delayed badge shipments to host hotels and high on-site demand. Some partnering hotels, such as in 2024, have enforced invasive room inspections on all guests, including DEF CON attendees, sparking widespread complaints over intrusions in a attuned to risks. To address capacity constraints, organizers have progressively adopted larger facilities, including expansion to dual venues by DEF CON 25 and utilization of the Las Vegas Convention Center's West Hall for recent iterations like DEF CON 33 in 2025. The 2021 edition (DEF CON 29) implemented a model combining in-person events with access, broadening participation amid restrictions and demonstrating flexibility for future disruptions. Operational adaptations include attendee guidance on heat mitigation—such as early arrival for acclimation, protocols, comfortable , and route planning to minimize sun exposure—alongside reliance on taxis or indoor connections between sites.

References

  1. [1]
    DEF CON® Hacking Conference - About
    The DEF CON Story ... Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada.
  2. [2]
    What is DEF CON? | Twingate
    Aug 29, 2024 · DEF CON is a renowned annual hacker convention held in Las Vegas, founded in 1993 by Jeff Moss. It unites hackers, researchers, and policymakers.
  3. [3]
    DEF CON® Hacking Conference Home
    DEF CON has been a part of the hacker community for over three decades. Pick up a bit of history and origin by watching DEF CON - The Documentary.About · FAQ · DEF CON Training · DEF CON 33 Short Story...
  4. [4]
    DEF CON | CISA
    DEF CON is a well-established hacker convention focused on computer security. This conference provides a collaborative space for the brightest minds in the ...
  5. [5]
    CTF History - DEF CON® Hacking Conference
    Defcon CTF is one of the (if not the) oldest CTF that continues to run today. Here you can find a brief history of the contest and its evolution.
  6. [6]
    DEF CON - Cybersecurity Conferences
    Dec 31, 2024 · Since June 1993, DEF CON has been one of the the world's longest-running and largest underground hacker event, held yearly in Las Vegas.
  7. [7]
    Hacking the Future at DEF CON 30 | Electronic Frontier Foundation
    Aug 8, 2022 · DEF CON grew and evolved into the world's largest hacker conference for computer security professionals, tinkerers, hobbyists, and more.<|separator|>
  8. [8]
    DEF CON: From Failed Party and Movie Inspiration to Global ...
    Jun 4, 2019 · The very first DEF CON was held in 1993 as a farewell party for founder Jeff Moss's friend, a fellow member of a hacking network called ...
  9. [9]
    DEF CON® Hacking Conference - DEF CON 1 Archive
    DEF CON 1 was held June 9-11, 1993 at the Sands Hotel & Casino, featuring talks on topics like computer privacy, UNIX security, and virus development.Missing: event details
  10. [10]
    6 Notable DEF CON Moments - Cybersecurity Conferences
    Aug 29, 2024 · #1 The first DEF CON​​ The first DEF CON conference was held in June 1993, with approximately 100 attendees. Jeff Moss (aka “Dark Tangent”), who ...Missing: details | Show results with:details
  11. [11]
    The origins of DefCon - I, Cringely
    Jul 30, 2013 · ... origin of these two conferences, which were started by the same guy, Jeff Moss, known 20 years ago as The Dark Tangent. Computer criminals ...
  12. [12]
    DEF CON® Hacking Conference - Show Archives
    DEF CON 4 was held July 26-28, 1996 at the Monte Carlo Hotel & Casino (Still there!) ... DEF CON 3 was held August 4-6, 1995 at the Tropicana & Casino (Still ...Missing: attendance early
  13. [13]
    Malicious Life Podcast: Jeff Moss on the History of DEF CON
    Jeff Moss, founder of the DEF CON Hacker conference (as well as Black Hat), discusses the origins of DEF CON, its "interesting relationship” with law ...
  14. [14]
    News: Is DEF CON turning legit?
    That was DEF CON 2000. While more than 4,000 people crowded the less-than-posh Alexis Hotel in Las Vegas to hear and see the latest on hacking, network security ...
  15. [15]
    Hackers are naughty and nice at Def Con - August 3, 2000 - CNN
    Aug 3, 2000 · Over 6,000 people descended on the Alexis Park Hotel for this year's Def Con event, which featured the curious spectacle of Defense Department ...Missing: attendance | Show results with:attendance
  16. [16]
    Real Time Social Networking for Ninjas - DEFCON 16
    DEFCON 16 was held August 8-10, 2008. DEFCON 17 will be held July 31 - August 2, 2009 at the Riviera Hotel & Casino in Las Vegas ...
  17. [17]
    Def Con XX: twenty years of hacker evolution - The Verge
    Aug 17, 2012 · He's excited by the community's growth and by the new generation of hackers. "There's a lot more people who are active and passionate about ...
  18. [18]
    Law Enforcement Officials Recruit Hackers - Forbes
    Aug 2, 2000 · The New Brand Growth ... The attraction was the eighth annual Def Con, a gathering of computer hackers and information security professionals.
  19. [19]
    Defcon Attendee Reflections - Reddit
    Aug 13, 2025 · When I started coming to Defcon, there were approximately 10,000 attendees. Now there are over 30,000 who come every year and it keeps growing.Vegas annual % cost increase : r/DefconIs defcon or blackhat worth going to in Vegas?More results from www.reddit.com
  20. [20]
    DEF CON 22 Recap | System Overlord
    Aug 13, 2014 · Apparently we'll have room blocks at several more of the area hotels. Makes sense given this year's reported 16,000 attendance. Tags: DEF CON, ...
  21. [21]
    One Schedule to Rule them All! - The One! DEF CON 33 - Outel.org
    ... 2010 - DC - Track 1 - Caesars Emperor's Level - Palace BR Bypassing ... There have been roughly 18,000-22,000 attendees in the last few years of DEF CON.
  22. [22]
    DEF CON® 27 Hacking Conference Villages
    The Tamper-Evident Village includes the following contests and events: * The Box; an electronic tamper challenge. An extremely realistic explosive with ...
  23. [23]
    DEF CON 23 - Lock Picking Village - Preston Thomas - YouTube
    Dec 9, 2015 · DEF CON 23 - Lock Picking Village - Preston Thomas - Intro to Lockpicking 1 ... 2010. Big Brain Security•106K views · 1:18:29. Go to channel ...
  24. [24]
    DEF CON® Hacking Conference - DEF CON 18 Archive
    You have found the repository of DEF CON 18 content, including video and audio of the talks, slides, white papers, extras, music, press and much more!
  25. [25]
    When DEF CON partners with the U.S. Army - Hacker News
    Aug 13, 2025 · Defcon is no longer a counterculture conference, and arguably hasn't been for a while. It's a place for security professionals to go to hang ...
  26. [26]
    Defcon Is Canceled | WIRED
    May 8, 2020 · The Las Vegas gathering, which would have taken place in August, will move to online sessions due to uncertainty about the Covid-19 pandemic.Missing: developments 2020s
  27. [27]
    DEF CON 2020: 'Safe Mode' virtual event will be free to attend ...
    May 19, 2020 · The upcoming virtual DEF CON 2020 hacking conference will be free to attend for all, the organizers have confirmed.Missing: impact | Show results with:impact
  28. [28]
    DEF CON delivers invaluable hacking insight, whatever color hat ...
    Aug 23, 2022 · This was my ninth DEF CON, and a welcome return to in-person attendance after the virtual experience of 2020 and hybrid approach to 2021.
  29. [29]
    DEF CON® 30 Hacking Conference Home
    DEF CON 30 is a semi-hybrid hacking conference in Las Vegas, August 11-14, 2022, with in-person and online content. The theme is 'Hacker Homecoming'.Missing: shifts | Show results with:shifts
  30. [30]
    AI Village: Home
    A community of hackers and data scientists working to educate the world on the use and abuse of artificial intelligence in security and privacy.Events · Blog · Discord Community · Leadership Team
  31. [31]
    Backstory Of The DEF CON Voting Machine Hacking Village
    Sep 12, 2025 · Jake Braun, who led the team that created the first-ever Voting Machine Hacking Village at DEF CON, one of the world's best-known hacker conferences.
  32. [32]
    WATCH NOW: Separating Fact from Fiction Regarding Election ...
    Aug 21, 2025 · FSFP co-hosted a symposium on election security on August 8-9, 2025, with the Election Integrity Foundation (EIF) at the DEF CON Voting ...
  33. [33]
    At DEFCON, ship hacking steps into the limelight - POLITICO Pro
    Aug 10, 2025 · Ships and ports are facing greater threats than ever before, at the same time the U.S. is gearing up for a possible conflict in the Pacific.
  34. [34]
    DEF CON® Hacking Conference - Transparency Report
    Since DEF CON 25, we have started to share a summary of incidents we are aware of that happened at the convention for a given year.Def Con 31 · Pre Def Con 30 · Does Def Con Publish Report...Missing: expansions | Show results with:expansions
  35. [35]
    DEF CON's response to the badge controversy - Hacker News
    Aug 10, 2024 · DEF CON's statement is falsifiable and direct: After going overbudget by more than 60%, [and] several bad-faith charges.Missing: expansions 2023
  36. [36]
    DEF CON Groups - What's Changing in 2025 : r/Defcon - Reddit
    May 21, 2025 · We've made a few changes to the way we name and sanction DCGs. We hope that this will make the process easier to navigate for Groups and help us manage ...Missing: expansions | Show results with:expansions<|separator|>
  37. [37]
  38. [38]
    DEF CON® Hacking Conference - Talk Schedule
    Main Speaking Tracks · Track 1. Continued · Track 2. Ghost Calls: Abusing Web Conferencing for Covert Command & Control · Track 3. Safe Harbor or Hostile Waters: ...Missing: core activities
  39. [39]
    The One! DEF CON 33
    A consolidated DEFCON 33 schedule that hour by hour has all the Talks, Workshops, Labs, Villages in one place for your use.
  40. [40]
    DEFCON: A Beginner's Guide - The Security Cafe
    Aug 14, 2022 · What started as a simple guide, became a 2000+ word brain dump of my past years' experience and learnings of Defcon.<|separator|>
  41. [41]
    DEF CON® 32 Hacking Conference Villages
    We invite you to explore the history of payments and to learn how modern-day payments work. The village is jam-packed with hands-on experiences and exciting ...
  42. [42]
    DC30: Villages - DEF CON Forums
    Growing from seeds of demand, the Biohacking Village emerged at DEF CON to deliver action-oriented reinvention of the safety and security of health care. Topics ...
  43. [43]
    DEF CON® 26 Hacking Conference Villages
    IOT village · Biohacking Village · Packet Hacking Village · Crypto & Privacy village · Wireless Village · r00tz Asylum · Lockpicking village · Hardware Hacking Village.Missing: themed | Show results with:themed
  44. [44]
    DEF CON Villages AMA : Wireless, Blue Team, IoT : r/Defcon - Reddit
    Mar 14, 2019 · This village is a DEF CON paradigm shift providing an area where Blue Teams can gather, learn basic and advanced defensive techniques, swap war ...
  45. [45]
    DEF CON® 28 Safe Mode Villages
    Villages. Aerospace Village. AI village. Appsec Village. Biohacking Village. Blockchain Village [BCOS Village]. Blue Team Village. Career Hacking.
  46. [46]
    DEF CON® Hacking Conference - Villages
    The village covers offensive operations, threat/APT/ransomware simulation, breach and adversarial attack simulation, supply chain security, adversary tactics, ...Missing: 2020s | Show results with:2020s
  47. [47]
    DEF CON® 32 Hacking Conference - Call for Villages
    The theme for DEFCON 32 will be released on the official DEFCON website, and will include the theme name, fonts, colors palettes, and official logo. Please have ...
  48. [48]
    A History of Badgelife, Def Con's Unlikely Obsession with Artistic ...
    Sep 18, 2018 · Attendees have started to craft their own circuit board badges, and for some, collecting these unofficial badges has become the main reason to attend Def Con.
  49. [49]
    A Five-Year History of DEFCON's Electronic Badges
    The badges, which sparked a community now referred to as #badgelife, featured active electronics mounted on artistically designed printed circuit boards. This ...
  50. [50]
    [PDF] DEFCON 16 Badge - | Nuts & Volts Magazine
    The primary goal of the DEFCON 16 badge was to incorporate a file transfer feature to allow an attendee to transfer files to another attendee using his or her ...
  51. [51]
    All The Hardware Badges Of DEF CON 25 - Hackaday
    Aug 4, 2017 · It was inherently a multiplayer badge, letting you discover and battle other badge owners wirelessly in a video role-playing game. You could ...
  52. [52]
    All The Unofficial Electronic Badges Of DEF CON - Hackaday
    Aug 10, 2015 · 2015 was the year of the unofficial hardware badge at DEF CON 23. There were a ton of different hardware badges designed for the love of custom electronics.
  53. [53]
    On the use of aliases at security conventions... - DEF CON Forums
    The history of using aliases, handles or nicknames has provided an extra layer of obfuscation when attempting to find the identity of a person.Missing: participant | Show results with:participant
  54. [54]
    For Hackers, Anonymity Was Once Critical. That's Changing.
    Sep 22, 2018 · At Defcon, one of the world's largest hacking conferences, new pressures are reshaping the community's attitudes toward privacy and anonymity.Missing: participant | Show results with:participant
  55. [55]
    DEF CON Hacker Badges - Cybersecurity Conferences
    Aug 29, 2024 · Each badge is a piece of history from a given year's conference, frequently related to the event's special themes and difficulties. As a result, ...Here's a Cool Video... · The History of the DEF CON... · Here's A Summary of DEF...
  56. [56]
    The DEF CON® Media Server - Archives of the conferences
    A collection of all DEF CON video presentations, music, documentaries, pictures, villages, and Capture The Flag data that can be found.DEF CON 32 · DEF CON 25 · DEF CON Torrents · DEF CON 1
  57. [57]
    DEF CON 33/DEF CON 33 presentations - DEFCON Media Server
    A collection of all DEF CON video presentations, music, documentaries, pictures, villages, and Capture The Flag data that can be found.Missing: workshops | Show results with:workshops
  58. [58]
    Workshops List – The One! DEF CON 31
    This presentation will include various resources and a few simple demos to show how to approach a CTF and how it may differ from "real world" hacking challenges ...
  59. [59]
    DEF CON 33 - Adversary Village
    Aug 10, 2025 · Schedule for the hands-on workshops and other sessions to be hosted in the Adversary Village workshop stage! Day 1: Aug 08; Day 2: Aug 09; Day 3 ...
  60. [60]
    Talks & Workshops Schedule - Payment Village
    Payment Village · Home · Events · DEF CON 33 · Capture the Coin Contest · Talks & Workshops Schedule · Slides · DEF CON 32 · Emulating magstripe · No badge?
  61. [61]
    [PDF] DEF CON 22 Official Program - DEFCON Media Server
    DEF CON CTF finalists qualify by winning the previous year's finals, placing highly in our qualifying event or by winning one of a select few CTF competitions ...
  62. [62]
    New donation strategy in 2025 : r/Defcon - Reddit
    Aug 16, 2024 · We publish where our money goes in closing ceremonies, and it goes to the community. We do have some setup costs that we have to cover (such as ...Missing: mechanisms | Show results with:mechanisms
  63. [63]
    [PDF] Welcome to the DEF CON 32 Capture the Flag Final!
    Aug 7, 2024 · The DEF CON CTF is a team-based, attack-defend hacking competition. Each team will be given access to a game network where they must defend ...Missing: format | Show results with:format
  64. [64]
    DEF CON® 27 Hacking Conference Capture the Flag
    We'll be located in Planet Hollywood in the Mezzanine for the duration of the competition, come say hi, and watch the best hackers on the planet duke it out.
  65. [65]
  66. [66]
    DEF CON CTF Finals: An Inside View - VMRay
    Sep 2, 2018 · DEF CON CTF is one of the original and most competitive cybersecurity competitions. In this blog post, I will shed some light on how to qualify for this event.Missing: history rules<|separator|>
  67. [67]
    Competing at the DEF CON CTF Finals 2025 - SRLabs Research
    Oct 2, 2025 · The qualifiers follow a jeopardy-style format, while the finals are primarily attack/defense. This year, twelve teams earned a spot in the ...
  68. [68]
    DEF CON® 24 Hacking Conference - Capture the Flag
    Current standings and information on this year's CTF Competition.Missing: structure | Show results with:structure<|separator|>
  69. [69]
    Hacking from the Pool: A DEF CON 2021 Retrospective
    Aug 11, 2021 · The scoring structure is such that attack points are earned for every team that they score against in a given 5 minute round, and defense points ...
  70. [70]
    DEF CON® Hacking Conference - Capture the Flag Archive
    Congratulations to the DEF CON 30 CTF Winners, Maple Mallard Magistrates! Read more about MMM! They were closely followed by the teams Katzebin and Starbugs, in ...Missing: origins format
  71. [71]
    CMU hacking team wins ninth DEF CON Capture-the-Flag title
    Aug 11, 2025 · The winningest team in DEF CON's Capture-the-Flag (CTF) competition history, Carnegie Mellon University's Plaid Parliament of Pwning (PPP), won ...Missing: origins rules format
  72. [72]
    All flags are not created equal: A deep look into CTF Scoring ...
    Nov 15, 2024 · The scoring is based on the teams' ability to defend their services from attack and attack other teams' services. It was based on a generalized ...
  73. [73]
    DEF CON® Hacking Conference - Black Badge Policy
    Feb 28, 2015 · A Black Badge is one of the highest honors that DEF CON can bestow on a person or team in recognition of their overall elite skills or ...
  74. [74]
    DEF CON® 32 Hacking Conference Contest results
    Capture The Flag *. 1ST – MAPLE MALLARD MAGISTRATES (5943) 2ND – BLUE WATER (5090) 3RD – SUPERDICECODE (3720). Cloud Village CTF. We had a fantastic time this ...Missing: history origins
  75. [75]
    DEF CON 30 in Review: How the Echelon Team Won a Black Badge ...
    Sep 13, 2022 · A Black Badge allows the holder to attend DEF CON for the rest of their natural lives. They are elusive, highly regarded, and treasured.
  76. [76]
    SimSpace Operator Wins Black Badge | DEF CON 30
    Aug 30, 2022 · The Black Badge is one of the highest honors a DEF CON attendee can receive, and in addition to earning free admission for life, Souba will be ...Missing: meaning recognition
  77. [77]
    DEF CON® Hacking Conference - Black Badge Hall of Fame
    The DEF CON Black Badge is a powerful talisman, awarded only to those who have emerged unbeaten from the crucible of elite DEF CON competition.
  78. [78]
    Some feedback on the 'Black Badge Raffle' : r/Defcon - Reddit
    Aug 13, 2025 · - Contests don't know until Sunday morning if they are going to get to award a Black Badge. During the con, Defcon organizers (notably ...Why is there no black badge winner at defcon last year ...Defcon 33 Badge Challenge Write-UpMore results from www.reddit.com
  79. [79]
    USF CyberHerd captures first place at world's largest hacker ...
    Aug 13, 2025 · DEF CON 33 included 72 specialized “villages,” each hosting its own competitions in areas ranging from car hacking to industrial control systems ...
  80. [80]
    DEF CON® Hacking Conference - Contests
    Apr 15, 2025 · This contest merges hardware hacking, cryptanalysis, mobile app forensics, physical security, and offensive security into one glorious, chaotic CTF.
  81. [81]
  82. [82]
  83. [83]
  84. [84]
  85. [85]
  86. [86]
    DEFCON 2025 Attendee List - Vendelux
    How Many People Attend DEFCON 2025? DEFCON typically draws over 30,000 attendees representing more than 60 countries. The audience features a mix of ...
  87. [87]
    A first time attendee's impressions of DEFCON 27 - LinkedIn
    Aug 25, 2019 · An estimated 30,000+ hackers and friends descended on Vegas for what is known as #hackersummercamp and the amazing, interactive, electronic ...
  88. [88]
    UNLV Cybersecurity Students Participate in DEF CON Hacker ...
    Aug 20, 2025 · This year more than 60 UNLV cybersecurity students and Cyber Clinic members had the opportunity to attend the world's largest hacker ...
  89. [89]
    For Feds and DEF CON, the Party's Over…For Now - IAPP
    For over two decades DEF CON has been an open nexus of hacker culture, a place where seasoned pros, hackers, academics, and feds can meet, share ideas and party ...
  90. [90]
    DEF CON® 29 Hacking Conference - Public Policy
    Hackers, policymakers, and everyone in between are welcome to come share ideas and learn from each other and other experts in these community roundtables.
  91. [91]
    DEF CON: The Heart Of The Global Hacker Community Beats
    Aug 3, 2025 · DEF CON remains the central hub of the global hacker community, drawing cybersecurity professionals, researchers, ethical hackers, ...Missing: characteristics | Show results with:characteristics
  92. [92]
    How to Make the Most of Hacker Summer Camp | SECURITY.COM
    Jul 22, 2025 · Hacker Summer Camp brings together Black Hat, DEF CON, BSidesLV and more for a high-energy week of security insights and hacker culture.
  93. [93]
    Black Hat 2025 & DEF CON 33: The Attendees' Guide - Splunk
    Jul 16, 2025 · DEF CON is one of the world's largest and most iconic hacker conventions, bringing together security enthusiasts, researchers, and hackers from ...
  94. [94]
    DEF CON Groups
    Welcome to the new DEF CON Groups page, to make things more dynamic and fresh we are redirecting defcongroups.org here to centralize Groups activities.Missing: affiliated networks
  95. [95]
    DefconParrot/DefconGroups: A list of DEF CON groups ... - GitHub
    DEF CON hacker groups, also known as DEF CON Groups or DC Groups, are local communities of cybersecurity enthusiasts, hackers, and tech experts.Missing: affiliated | Show results with:affiliated
  96. [96]
    DEF CON Groups USA
    Apr 15, 2020 · DEF CON Groups USA · DCG862 - Parsippany, NJ · DCG Syracuse · DCG Albany · DC757 Hampton Roads, Virginia USA · DC907 Anchorage, Alaska USA · DCG Honolulu.Welcome to DEF CON Groups!U.S. Inactive DEF CON GroupsMore results from forum.defcon.orgMissing: affiliated networks
  97. [97]
  98. [98]
    DEF CON® 32 Hacking Conference Parties, Meetups, & Events
    Join the local DC702 Group in this year's official DEF CON Meetup! The meetup will be casual and include typical meetup activities (e.g., socializing ...
  99. [99]
    Communities List - The One! DEF CON 33 - Outel.org
    DEF CON Groups VR (DCGVR). Community DC Forum Page Community Page – Virtual. Friday and Saturday: 10:00 – 18:00; Sunday 10:00 – 13:00. DEF CON Groups VR (DCGVR) ...
  100. [100]
    11 top DEF CON and Black Hat talks of all time | CSO Online
    Jul 21, 2020 · Since 1997, the Black Hat and DEF CON events have gained a reputation for presenting some of the most cutting-edge research in information security.
  101. [101]
    Schneider Electric Patches PLC Flaws Disclosed at DEF CON
    Sep 4, 2015 · Schneider Electric has addressed the PLC vulnerabilities disclosed at DEF CON. Other SCADA vendors are also expected to release patches.
  102. [102]
    Zoom Patches Serious macOS App Vulnerabilities Disclosed at DEF ...
    Aug 16, 2022 · Zoom has patched high-severity macOS application vulnerabilities disclosed by a researcher at the DEF CON conference.
  103. [103]
    Researchers at DEF CON Release Report Describing ...
    Hackers at the Voting Village demonstrated to legislators a wide range of vulnerabilities in the election equipment brought to DEF CON. Administrator passwords ...Missing: examples | Show results with:examples
  104. [104]
    Data centers at risk due to flaws in power management software
    Aug 14, 2023 · During the DEF CON security conference, researchers at the cybersecurity firm Trellix disclosed vulnerabilities in commonly used applications ...
  105. [105]
  106. [106]
    Some Voting Machines Still Have Decade-Old Vulnerabilities - WIRED
    Sep 26, 2019 · The results of the 2019 Defcon Voting Village are in—and they paint an ugly picture for voting machine security.
  107. [107]
    [PDF] DEF CON 2 7 Voting Machine Hacking Village
    Aug 5, 2019 · Voters cast their ballots by inserting them into the AccuVote OS system, where votes are digitally tabulated, recorded, and stored. Originally ...
  108. [108]
    DEF CON Franklin project enlists hackers to harden critical ...
    Aug 12, 2024 · DEF CON Franklin project enlists hackers to harden critical infrastructure · To create a 'Hackers Almanac' that can guide lawmakers and policy ...Missing: influence | Show results with:influence
  109. [109]
    DEF CON hackers plug security holes in US water systems
    Aug 10, 2025 · Volunteer DEF CON hackers dive into America's leaky water infrastructure · DEF CON Franklin project enlists hackers to harden critical ...
  110. [110]
    Waterbury joins DEF CON Franklin program to strengthen ...
    Feb 3, 2025 · The program is called DEF CON Franklin and is a collaboration between the University of Chicago Harris School of Public Policy's Cyber Policy ...<|separator|>
  111. [111]
    Most Promising Development of 2023: Government Focus on Cyber ...
    Dec 13, 2023 · For example, Policy @ DEF CON grew significantly this year, with three dedicated tracks of policy content running throughout DEF CON, and ...
  112. [112]
    Cyber experts ponder a non-government future for the CVE program
    Aug 11, 2025 · Organizations supporting the security vulnerability program said it needed changes to improve stability and rebuild trust.
  113. [113]
    DEF-CON-33 – aicyberchallenge.com
    In short, DEF CON is a platform for inspiring and advancing the state of the art – and that is exactly what the AIxCC program is all about.
  114. [114]
    Cyber Policy Initiative | The University of Chicago
    CPI currently partners with DEF CON, the world's largest conference of hackers and technologists, and various government agencies at home and abroad. CPI is ...
  115. [115]
    [PDF] The DEF CON 32 Hackers' Almanack
    Feb 5, 2025 · DEF CON is a "Hacker Summer Camp" where hackers explore technology, with themes like AI, biohacking, and ransomware. It includes many ...<|separator|>
  116. [116]
    DEF CON reveals auto cybersecurity vulnerability, Trustonic offers ...
    Oct 1, 2025 · A security vulnerability revealed at DEF CON has highlighted a significant concern in the automotive industry. A researcher demonstrated how ...Missing: discoveries | Show results with:discoveries<|separator|>
  117. [117]
    In Conversation: Learnings for CISOs Post Black Hat and DEF CON
    Sep 10, 2025 · Conversations at both Black Hat and DEF CON showed a strong appetite for deeper collaboration between government agencies and the open source ...
  118. [118]
    At DEF CON 33, the Power of Responsible Disclosure Takes Center ...
    Sep 4, 2025 · Their demonstration at DEF CON 33 revealed several vulnerabilities in Zero Trust solutions from myriad vendors. The unveiled vulns were ...Missing: notable | Show results with:notable<|separator|>
  119. [119]
    Def Con spotlights AI's soaring importance in the high-stakes ...
    Aug 12, 2024 · Two high-stakes competitions at Def Con spotlighted large language models (LLMs) as both an essential tool to protect software from hackers as well as an ...
  120. [120]
    How I Won DEF CON's Generative AI Red-Teaming Challenge
    Sep 26, 2024 · This blog post details his experiences with the challenge, what it took to win the grand prize, and what he learned about the state of AI testing.
  121. [121]
    DEF CON is canceled! No, really this time – but the show will go on
    Feb 7, 2024 · "We don't know why Caesars canceled us," Moss wrote. "They won't say beyond it being a strategy change and it is not related to anything that ...
  122. [122]
    DEF CON badge spat gets physical as dev removed from stage
    Aug 13, 2024 · Dmitry Grinberg, firmware developer for this year's DEF CON 32 badge, was physically removed from a talk about the project Friday.
  123. [123]
    Hacker's Ethical Dilemma - Marcus Sailler, Ethical Hacking - YouTube
    Oct 19, 2022 · In cybersecurity, there isn't an ethical dilemma for bad actors, but there is for good ones making and improving open source code that bad ...Missing: debates practices
  124. [124]
    The Cybersecurity 202: Lawmakers dismiss voting machine maker's ...
    Aug 28, 2018 · The company's assertions drew sharp criticism from security experts. Some noted that the voting-machine hacking demonstrations at Def Con were ...<|control11|><|separator|>
  125. [125]
    David Scott Lewis - Hack Back Not An Option But A Necessity
    Aug 29, 2019 · ... practices, and will then review how Chinese ... DEF CON 26 ETHICS VILLAGE - David Scott Lewis - Hack Back Not An Option But A Necessity.Missing: debates | Show results with:debates
  126. [126]
    DEF CON 26 ETHICS VILLAGE - Responsible Disclosure Panel
    Nov 30, 2018 · are we responsible to? Can we set a standard practice that is ethical, fair and effective? These and other questions will be discussed by ...
  127. [127]
    Feds asked to avoid Def Con hacker meeting - BBC News
    Jul 11, 2013 · Revelations about the scale of US government spying meant emotions in the hacking world were "running high", said organisers of the Def Con ...
  128. [128]
    Hacker convention asks U.S. government to stay away | CBC News
    Jul 11, 2013 · Snowden, 30, is wanted by U.S. authorities, who have charged him under the Espionage Act with unauthorized communication of national defence ...
  129. [129]
    Researchers race to document voting machine vulnerabilities ahead ...
    Aug 13, 2024 · Voting machines are key physical targets in election fraud schemes. At the DEF CON hacking conference, cybersecurity experts have been working to safeguard ...
  130. [130]
    AI is biased. The White House is working with hackers to try to fix that
    Aug 26, 2023 · Hundreds of hackers probing artificial intelligence technology for bias as part of the largest-ever public red-teaming challenge during Def Con.
  131. [131]
    For U.S. officials, the world's largest hacking conference isn ... - Politico
    Aug 12, 2023 · As of Friday afternoon, there were at least 2,000 sheep at DEF CON, per the floor-to-ceiling projection. Their personal information was ...
  132. [132]
    U.S. may act to keep Chinese hackers out of Def Con hacker event
    May 24, 2014 · U.S. agencies are weighing a range of options if China does not a curb its cyber espionage, said the official, who was not authorized to speak ...<|control11|><|separator|>
  133. [133]
    When counterculture and empire merge - Jack Poulson | Substack
    Aug 11, 2025 · DEF CON has alienated many hackers by officially aligning its geopolitics with those of the U.S. military and announcing partnerships with the ...
  134. [134]
    DEF CON 11 Hotels and Travel
    Hotel, Rates ; The Alexis Park 375 E. Harmon Avenue Las Vegas, NV 89109 1-800-582-2228 or 702-796-3300. This is the official con hotel. Stay at the Alexis Park ...
  135. [135]
    The Riviera Hotel and Casino - Defcon
    The world's largest underground hacking convention! ... Riviera Hotel & Casino on-line room registration. DEFCON 15 Group discount rates are good from July - ...
  136. [136]
    DEF CON® 23 Hacking Conference - Schedule
    DEF CON 23 is August 6-9 at Paris & Bally's in Las Vegas! $230 USD for all four days! Cash only at the door, there is no pre-registration. BOOK A ROOM!<|separator|>
  137. [137]
    DEF CON® 32 Hacking Conference Venue & Hotel Information
    We will have all villages, contests, talks and events under one roof. To give you an idea the LVCC space will be about 800k square feet, and the old Caesars ...
  138. [138]
    Defcon 2014: High-Profile Hacker 'Dark Tangent' Talks to TIME
    Aug 12, 2014 · It's one of the biggest hacker conferences on Earth, with about 15,000 attendees this year. ... History · Sports · Magazine · The TIME Vault ...
  139. [139]
    DEF CON 24 — The ultimate hacker conference on the planet
    Aug 15, 2016 · Jeff Moss (aka Dark Tangent) announced that there was easily a 46% increase in attendance from last year with this year having seen over 22000 ...Missing: scale growth figures
  140. [140]
    DEF CON 24 – When cyber security became mainstream - LinkedIn
    Aug 17, 2016 · ... records for attendance – 22000 people, a whopping 46% increase on 2015 ... What's amazing is the overall growth of DEF CON in the past ...
  141. [141]
    Longest-running hacker convention | Guinness World Records
    The most recent in-person edition of the event, 2019's DEF CON 27, attracted an estimated 30,000 attendees. The convention attracts a wide range of people ...
  142. [142]
    DEFCON 33 @Las Vegas Convention Center
    DEF CON 33, set for August 7-10, 2025, at the Las Vegas Convention Center, expects 30,000+ attendees, up from 28,000 in 2024, with peaks over 35,000 ...
  143. [143]
    DEF CON launches public policy report, volunteer program
    Aug 12, 2024 · Def Con With an average of 30,000 attendees per year at the DEF CON security conference in Las Vegas, it's safe to assume at least one or ...
  144. [144]
    How to Attend Defcon Without Looking Like a Noob or Spending a ...
    May 18, 2018 · Thousands of new people attend Defcon every year, and Defcon 25 was said to have 25,000 attendees, forcing it to expand to two venues. No single ...
  145. [145]
    DEF CON 2022 Background - The Lost Policymaker
    Now in its 30th year, DEF CON draws 25,000-30,000 people and is usually held the first full weekend in August, is unlike typical conventions or trade shows. The ...<|separator|>
  146. [146]
    Insights from DEF CON 33: From LLM Hacking to Supply Chain ...
    Aug 13, 2025 · Las Vegas in August means three things: blistering heat, neon overload, and thousands of security professionals, researchers, and hackers ...
  147. [147]
    DEF CON 31: A hot time in the Las Vegas heat and some cool days ...
    Aug 21, 2023 · DEF CON is comprised of multiple workshops, talks, capture-the-flag, CTF, competitions, and villages. Villages are dedicated, independently run ...Missing: date | Show results with:date
  148. [148]
    DC31: Unofficial comments on lines to redeem pre-reg codes, or buy ...
    Jul 13, 2023 · There are too many variables. * Will the DEF CON Badges arrive at the hotel on-time? * Will badge sales open on time? be earlier? be ready?
  149. [149]
    Black Hat USA 2024, DEF CON 32 attendees treated like children
    Aug 7, 2024 · Black Hat USA 2024 and DEF CON 32 attendees raise privacy concerns after finding out all Resorts World Las Vegas hotel guests are subjected ...
  150. [150]
    DEF CON 29 with be both in-person & virtual
    Apr 15, 2021 · DEF CON 29 will be a hybrid conference, partially in-person, and partially online. DEF CON will not be a “normal” con, but more like DEF CON ...
  151. [151]
    How to avoid getting burned at Black Hat, destroyed at DEF CON or ...
    Aug 5, 2019 · But just like Black Hat, DEF CON has metastasized and has tens of thousands of visitors and now sprawls over three different hotels, leading to ...Missing: overcrowding issues
  152. [152]
    DEF CON: The Ultimate Guide for First-Timers | by Ginny Fahs
    Aug 20, 2019 · Pack a water bottle, comfortable walking shoes, and enough layers to take on intense heat intense air conditioning. Bring plenty of cash to ...Missing: acclimation | Show results with:acclimation