Lightning Talks (1)
6:54PM Jul 27, 2020
We're live again. I feel like I'm working hard today, am I just imagining things. This is lightning talks, and we do not have enough contestants yet for lightning talks, I have just now posted to the hope announcements screen. The Matrix chat. So if you're a registered attendee only for ticketed folks, you're welcome to join lightning talks, email me, I put my email in that address we'll try to track it while we're sitting here, and I will send you the link to this teleconference and you can come in and get on the get in on the lightning talks, we have two lightning talks that have showed up so far in the room, hopefully we'll have a few more we have time for maybe even certainly half a dozen maybe a few more than that. The idea of lightning talks, is that for whatever reason, not everyone is on the hope schedule some people signed up a little late to know about the conference. Other people have late breaking news. And there's even a few folks that submitted an idea but weren't selected for the conference and they want to share that idea here. So lightning talks is totally open can be really on any topic, and what we try to do since it's a lightning talk is we keep it to just five minutes or so, I don't have a big Bell but I have a. I have a powerful button here on my control panel. If necessary, but we keep it to around five minutes and, and only around five slides. So we try to be very, very rapid in cycling through these. So that's, that's the process it's not a contest it's brief presentations, and I'm going to go in the order that people arrived in the room and Artie is first this is our big winner. For those of you that were tuned into hackers calendar, but he has something, something new to share. So what we'll do is I'll ask side pocket, you can go ahead and mute and Artie you can go ahead and enable your audio and do share your screen and go ahead and take your take your five minutes, and anybody else that wants to be part of it. Find the hope announcements link and you can message me and I will invite you to this forum. So that's me and go ahead and take it away Artie Thank you.
Hello. Thank you. Well, thank you for the opportunity. First of all, I want to, to say that I'm very grateful that this is my first hope. And well, let's bring it on my talkies is titled divide and conquer. My email is there if you want if you have any inquiry there a later. Well, I just, I first want to start with a quote that I like from one of my favorite books that's called foundation by Isaac Asimov and wage is one of the main themes is decentralization it's it's a core part of the, of the Society of the
rebuilding of society that
they idi. Well, some of you may have read it for dad to do, too, two entities have been placed
on it because I can't hear the channel now I don't know why I hope that's not going to interfere with what's going on so it's cross your fingers here
at the opposite ends of the galaxy and they are tasked with rebuilding the society. My point is that we are now. Extremely dependent on big companies like for example I'm showing there, Amazon, Google and Facebook, which control or our daily lives and in all the implications, they have did they have digitally. And well, we have a choice to not use them, we have free alternatives, but the point is that they have become so deeply entrenched in our daily life that for example, the other day, I wanted to, to play a game with with my girlfriend and I couldn't because I had to use one of Google's capture and some other times we want to see a blog from one person on the internet, but they have Facebook cookies and stuff like that they, they have so much control right now in our daily life that it's become very difficult for us to to stray away from them. And well. The idea is that well if if not, if not our fault. We, as I said, we have most of the time, no choice of escaping. They have a control they can control what we think because, well, they can choose their first results we see when we search for something on Google, or the things that appear in your timeline on on Twitter. And that's why I've been working on, on a project called future, It's a search engine. And that's powered by a deep learning algorithms that I've been that I've been training on my house at self hosted also in my house I have an old computer running the server in the basement. And well, The idea is to make an open source in a search engine, and I want to I'm looking right now for ways. And a shard, the make shards of the information that is being crawled so that different devices can act like a hive that powers the search engine. You can find it there, and there is also the, the link to the web page. Well, thank you very much.
Perfect. Great, thanks for leading off the lightning talk and for those of you that don't know this is the big winner of hackers got talent, the first edition from from last Saturday night. So we're gonna do hackers Got Talent again next Saturday, we're planning on doing lightning talks again as well in a couple of days so stay tuned. All right, well thank thank you very much. You don't need to stay in a conference anymore I don't think but the the chat room is open so people that have any comments input, you can go to the live stream sessions QA chat room and matrix and have discussion with the, with the speaker.
Okay, thank you very much.
Thanks again. And up next is psych pocket, are you ready go ahead and unmute your video on mute your audio side pocket and you can go ahead and and share.
Rob does not see you, yes I pocket or hearing you.
Can you all hear me in here.
We heard you now. Thank you don't see you we are hearing here.
Just want to double check my mics, working. Do you hear me,
just needs a thumbs up, hear me share screen.
Okay, so I'm sharing the screen now.
There we go.
Okay, so if you guys can see this hopefully, um, Hello everyone, this is a. Why is nothing showing up right now, since the screen sharing Hang on,
trying to get to
try to see if anyone everyone could see my browser here.
Why isn't that I apologize, might have to go to another lightning talk for a moment because I'm trying to,
it was. Yeah, it was coming and going. We did see it.
Okay, now it should work.
All right, there we go, so sorry about that we're going to make this as quick as possible Hi this is a side pocket. I'm one of the cofounders of DEF CON tool one more group that meets every third Friday of the month. We've been live streaming and really enjoying hope and we also want to shout out that if you want to have hope all in one place on our blog, we have a guide that we've wrote that basically compiles all the hoop news together in one sitting now it doesn't have all the talks and everything we did post some highlights but we just want to let you know that we're going to have those guides plus guides to all the hacker stuff going on all month here. So, my talk is simply about congratulations Today is National New Jersey's day Woohoo. And if my mic. Well if my cameras working we also have an issue of weird and Jay here. I'm basically to celebrate you're going to see partially my notes. I wanted to celebrate National jersey day by basically blabbing in five minutes about all the awesome hex stuff that was actually made in New Jersey. So, we have to even go way back because Bell Labs is coming up. And as much as you might love or hate the guy. One of the Oji in invention areas is the, is Thomas Edison's various r&d workshops are one of the first r&d places to be invented they were made in Menlo Park, which currently has a memorial stand there and 400 most notorious inventions here, including recording sound and working with his colleagues to make the first ever instance light bulbs so already at the start, New Jersey just has a very big vibe of invention and drive for innovating and corporate selling out and stuff like that. Then if we can jump ahead a bit here which This is nuts and kind of less known. We jump over to the Institute of Advanced science in New Jersey where john von Neumann basically in 1945 gathered a bunch of engineers, trying to make basically the first use of a random access storage matrix computer. Basically there on this campus. He wanted to make Alan Turing's idea of a machine to become into reality where it can actually do computational powers as well as access visual memories that can be restored and stored again unlike the single use computations that was most commonly seen in the advanced Bombay machines that Turing made to help crack the Enigma machines which there is a top talk that's going to deal all about Enigma machines I can't wait to check that out if you want to know more about how basically as written here. He worked out the bounds of the industry breaking rules of academia, relying largely for the US government support dungeon engineers in their 20s and 30s, and they built the computer less than 1 million under five years you can read this amazing book called The current. The Turing's Cathedral by George Dyson. It's one of my personal favorite books that details all that you can check it out. Now we're going to get to the more modern juicy stuff I don't know if anyone recognizes this campus. This is the original, New Jersey Bell Labs campus. Bell Labs started off in New York, if I remember correctly in the early 20s but in around 1940 I want to say 1945. They were sick and tired of the property values and how congested New York is and they pulled their butts over to New Jersey and they opened up multiple divisions in New Jersey from Homme del the Cranford deal state freehold Lyon Croft longbranch Middletown Neptune Princeton piscataway readbag gesture and Winnipeg, who Crawford Hill are the only one that remains and I believe Murray Hill is the only place where Bell Labs as part museum part semi research centers still exist. Bell Labs, basically invented a lot of things during this day in New Jersey, including the first actual, they did a lot first working so they did the first working transistor, which was made in 19, which was developed from November 1947 to December 1947. Um,
Let's see here. Just wanted to remember this Yes, saw state's physical leader William Shockley saw the potential on this and they they prior to development. Russell, oh did the first patent for the, for working solar cell in 1954 they actually developed the first folding cell. Another thing they did was they teamed up with a Canadian telephone companies to create tt 80 dash one, which is the first ever Atlantic cable line bridge between two nations, and in 1959. Mohammed, Allah and dogs and Dawson Kong invented a new type of oxide semiconductor system that allows for large scale circuits, and probably for most of the old and young ends that most people know ah. We also have the indentation of the C language, and it's many modern variants and languages they're inspired by those such as Python and Ruby and unfortunately rust So pretty much if you've used the programming language, and especially if you've used C and you can't stand C as a New Jerseyans would say, You're welcome for that frustration. One of the last two topics I want to talk about just because there's so little unknown is ironically in Sept on September 11 1955. The Secret Service actually set up a bulletin board in Bergen County New Jersey. That was known as I'm trying to remember why I wrote this year. A SHERMER correctly was I think known as like a silent one was the name of the bulletin board, and they particularly set it up to try to get people to talk about cell phone cloning and computer hacking and sorry that happened in January of, 95 September 11 six hackers were arrested including a Richard largecap who's known as chillin and can walk INS jemmy crushing known as alphabets Frank Milady known as a mind, Ali Al bramford known as cell phone, and Michael Clarkson a barcode all over these six states were under that bus to the point here where I have an archive or the wireless Association praises. The Secret Service for doing that bus which shows you that giant companies cracking down on freedom of information is not anything new, this has been going on for a while. A, hands up real quick, if you've heard of this guy. So I don't know if the audio is going through, but this is Gio Haute, He is most famous for the now the iPhone jailbreaks but also for the PlayStation. Three hack debacle and here he is rapping about getting arrested and a lot of people don't know about Joe Hodes that we brought up at our PAX East topic, and then I'm almost done, is that he he actually was born and raised in New Jersey and went to college in New Jersey unfortunately campmor, don't. But that was a whole thing there. And finally, in the last piece to celebrate National, New Jersey day. I don't know if anyone's ever heard of Baidu, this is very recent so Baidu is basically China's Google. Besides Tencent. They serve out like Google as a search engine they've grown they have their own map systems and various technologies they basically make up of half of China's infrastructure and like it said they're the China, they're the Chinese equivalent of Google, to the point which I brought this page, they have been to DEF CON spin off in China that they've directly sponsored, but what a lot of people don't know about Baidu is that in 1994 Robert Lee, who is one of the CEO, who's the CEO one of the co founders of that company actually developed, all the backend code for the search engine. When he was working at the New Jersey division of Dow Jones. So, just to show you how important New Jersey actually is China wouldn't have the tech infrastructure, they would have that they developed in the 90s that they deployed now especially cracking down on Hong Kong citizens, if it actually wasn't for some code developed in New Jersey so all China's back end code is basically developed in New Jersey. Anyhow, that was basically my lightning talk again Happy National New Jersey day. If you're ever confused about home please check out our guide on our blog and you can find out our blog and other information as at DEF CON two one hack the planet and dirty jersey represent Peace out.
Quit your job that you went over time, but we don't have a plethora of lightning talks if you want to get in lightning talks you can send an email, while it's happening to me just find this posted now in the livestream q&a session and it's also posted in the general hope announcements so if you're in matrix chat, you can join lightning talks if you're not well, you should have gotten to matrix chat with Nick say thanks I'd like a very good. And as I said, it's in the competition so you can follow the part of the virtual meeting room here when you're ready, we have at least two more that are queued up the first one is from for us. Why don't you just go ahead and unmute and turn on your video and you can take it away.
Although I have been doing most of the audio visual production for the last couple of days here and I have a little, little gotcha that's happening to what we call the defense industry base, these are all the small manufacturers and even to the large manufacturers that are happening between.
Hang on here.
These are the manufacturers that make you know a bolt washer maybe some custom machining for repair part for a helicopter, you know, or even cut the grass for a military base. And there's a new regulation that's coming out, and it's, it's called CMM c it's a cyber Maturity Model. If that's actually a misnomer, it's not true. It's more of a cybersecurity certification to a certain level. Before you can do work for the God. And that's not just it is for the entire God. So, it's kind of like PCI and HIPAA where you have to have like a minimum cybersecurity level to interact with those types of entities, but instead it's for the DOJ and it's enforced what they're gonna have you do is have a certified auditor come audit you and then you get your score, and that's all scored into it's a one through five minimum is one maximum is five, mostly we're gonna sit around three and three is where they're supposed to be right now, but at that self assessment, and you just have to attest that you're compliant with this which isn't very good, because nobody has been doing it and most people have been lying about it and a few people have gone to jail because they've lied about it and then got breached. There's a missile defense contractor that that happened to. So I'm starting to end up like a Ponzi scheme though so they have the CMC Accreditation Board, the Accreditation Board requires. If you want to assess companies in audit companies, you have to become a certified practitioner. And then you have to again then certify for each individual level that you're able to audit for one through five and you have to pay like five grand for every level. And then on top of that, based off the current release documentation there they're going to have where somebody says I need an audit for a company, and then people bid against that. So you're going to end up with like the lowest common denominator with that so they're gonna price everybody out and no one's going to be able to make any money off of this. Besides the Accreditation Board because they get a kind of every you know accreditation that comes in and this is gonna be, you know, 300,000 companies that are gonna require the certification, and it's pretty extreme level three which is where everyone wants to be is kind of for the protection of what we call controlled but unclassified information. It's called COI or kuih if you ask the seaso over there. That's what she calls it,
this data is more like guy but for the government, very similarly the federal contracting information. This is a details that would be contained within a federal contract that should be public. but isn't necessarily like secret, it's more like FOIA documents for your eyes only type stuff. And it's marked very similarly and it's marked similarly to secret. It's kind of handled like that to a certain degree but then it's not it's just you know whatever they get their hands on right. And so, I'm in the with 110 controls and then somewhat like 148 think, and it's. It requires a lot right, and generally half the DI B is going to require level three the other apps gonna at least require level one level three requires you know FIPS validated cryptography for everything requires multi factor authentication for everything. It requires, you know, three years of firewall logging and it's somewhat it's very vague it's like a one line requirement. It's really meant a lot of it's taken from 153, which is another, you know, NIST cybersecurity framework of sorts and they're going to enforce this among small businesses where you know they might have an Active Directory right and that's like half the industry right now that manufactures things for the God. So considering this might be a common problem and this is pretty much happening next year. They're gonna start rolling out contracts next year and then after that it's gonna snowball from there. And the way that they kind of set it up, is that they're going to require this certification before you can even bid on the contracts or even that they'll even accept you. So it's going to be one of the more fundamental changes that's going to happen to cybersecurity over the next four years the next four to 10, is that they're going to really require a lot of these small manufacturers, a lot of these small places and research labs to you know actually look at cybersecurity and be required and certified, and that's never been done before, not on this scale I mean we had HIPAA, we had high trust we had PCI and it was never really enforced very well especially on the small scale stuff, you know like one or two person shops, but even those people who are required to be certified, what's going to be happening as businesses are just going to close, or they're not going to do business with the TMT anymore they're going to end up with a problem of, they can't get their thingamajigger made. So, I've already ranted enough I do this as my day job, I am a cyber security auditor for this type of stuff so be on the lookout for it it's called C MMC google it there's plenty of stuff floating around about it now half of its misinformation anyway so, but keep your eye out for it, you may come across your doorstep. Alright I'm done. I've got my right in.
We had a. We had a talk this morning as you know from someone that was a whistleblower and DHS, and I wonder if we're going to be seeing whistleblowing about this next fiasco another couple of years.
Oh, I can see a common, there's been so much lying that's been happening in the last four years that it's really gonna put a damper on everybody's day whatever it really starts getting in force. Yeah,
yeah, that's what the technologists do appreciate it, appreciate it for us is going back to the back of I guess he never left the dungeon but he's going back to the virtual dungeon to, to keep the audio flowing. Lily you are here, but I don't see your analyse your microphone, Lily speak Hi,
not hearing me lol either me
something. Well, hey, do you hear me, can you hear me, hear me,
hey, we've achieved success. Applause thunderous applause, everyone. Thanks You're up Lily go ahead and share your screen or turn your camera and hold forth with your content
Wait. Okay. Yeah. Okay,
getting a lot of delay, is that meant to be the case.
Oh, boy. We are ready for you I think you're watching the live stream.
share my screen.
Okay, I can hear the live stream, primarily. But, yeah, I'll share my screen now ready to be not a great on deck. How do I do it though, share screen. Got it. Okay. I don't have anything specifically to share on my screen, but you can look at my screen anyway because
Okay, so my name is Lily, and I am a person who thinks about security and relationships specifically. I have only just kind of seeds of thought. Based on what I've gone through in my own life for cognitive behavioral therapy. So, in this regard I think about how to create relationships and connect with people, and the concept business marketing concept of AI da, which is attention interest desire and action, as well as how the cognitive behavioral aspects of thoughts, emotions and behaviors overlap with
loyalty and respect as pro social cognitive, emotional, and behavioral connections, and then also how you can go a social with the aspect of dishonesty betrayal and disrespect or however you want to term it maybe lack of caring or disregard.
in the rush to just kind of put a lightning talk together last second, I'm just going to kind of pre flow and watch the time. I will hear you, Greg, in case there's any. Don't keep going a little, you know, they won't see anything most likely. Actually I can maybe look up, I'll see my own screen shirt. Okay, anyway, so proceeding on so I think about relationship building in terms of not just a business but interpersonally and with oneself even. So, whenever there's a need to be met, giving that attention. And then, acknowledging it, and then having an interest, saying like well you know I actually do care about achieving this
haven't moved to the point of action,
or even desire necessarily so. If you've progressed from that interest to desire of like okay, I really do want to do something, but like, you know, there are times that I can't because like you know if your parents, your kid is trying to get your attention and they, you know, they're trying to interrupt or something like that and like Well look, you know I'm busy at the moment. Can you please hold on. It's not that I don't want to help. It's just that I, I'm conflicted. And then actually moving to the progress to the last stage of action. in which case. Maybe there's a compromise or some type of, you know, agreement reached in which need is fulfilled. And so this can help gain more trust and loyalty and respect over time. And I think that it starts from the bottom up, I really do think that cognitive aspects are involved with power and control, and
just making sure that
you can make yourself vulnerable to like let your needs be known. And then on the loyalty side, you know, you've got maybe courage and bravery, as opposed to cowardice and fear, you're willing to put the love of others above. Love of yourself. And then terms of behaviors to assertiveness like the sake of composure or protecting someone or something without compromising the opposition. It's like if you have, you know, somebody who is potentially threatening you. For example, just like maintaining calm and being willing to continue.
Caring instead of
reacting with anger and intimidation and see that I've gone about four minutes now with the top, thus far sorry that my screen is an interesting, but I appreciate the slight platform, and I will yield my time back to Greg.
Hey, thanks so much for joining us, slowly, and we appreciate that. There were some comments in the chat, comparing your blank notepad screens to the background that Forrest had just before then, so that was, that was an interesting counterpoint I feel like we've gone from the Arctic to the desert or some other juxtaposition. We don't have another person lined up to give a lightning talk so I'm going to give mine. I was going to prepare this and I decided oh I shouldn't do that because I'm doing all this emceeing and stuff, but what the heck. And for those of you that were watching my Project Gutenberg talk just earlier you know that sort of a literature guy. And so my lightning talk is, you should read, Edward Snowden this sermon and record, and I'm sharing my screen here to show you the download pages from the Kobo site but it's easy to find this out there you go, you can get a printed booking and audio book, wherever you want. Everyone knows who Edward Snowden is he was a speaker at home, a few years ago he was virtually on the stage from his home in Russia, but shared the stage with Daniel Ellsberg, the very famous whistleblower from the 1970s. It was such a such a wonderful experience. But, Edward Snowden. In this book, he tells his personal story and his motivations and those I find to be just very very fascinating and it's come up a few times in talks I've been part of your hope already. Why do people choose to basically throw away their career, and really really disrupt their, their lives, in order to share the truth, in order to disclose things that are in the public interest to know, according to in this case Ed Snowden.
and yet hidden secret. So, this is, this is something that I found to be just very inspiring the book permanent record has.
We was where it came from, how he grew up
as widely covered he's not someone that was basically a military. So he's someone that had a lot of a lot of knowledge, a lot of interaction with some sort of military government grew up, or we spent a lot of time growing up in the Beltway area of Washington. The book is just fascinating I really recommend it anyone that's involved with hope conference I think would be interested in knowing some of the story behind the story some of the motivation, with Ed. And the thing that I found two things I think I'll mention one is I found it really interesting to understand some of his personal thought record, this was not a random whistle blowing or random act of document sharing. Not a spurious thing, this was a very thoughtful deliberate multi year process of being concerned, and then eventually deciding that you want to go public with those concerns, and in fact when he went public he was introspective and careful enough to know about the character assassination, that would take place when he went public and he called it exactly right. And by the way you should watch. Lauren French's film citizen for. To learn more about this. The other thing that was really interesting is the tech now he did not disclose further classified information, he did not do further whistleblowing or something like that in the book he I think he probably considered himself to be done with with sharing what I needed to share and he's obviously out of the out of that role now as a government role he was in contract a little, but, um, but he did talk a fair amount about how the exfiltration of data occurred is kind of a fascinating story and involves a Rubik's Cube, and he doesn't go into all the details intentionally. But, but just kind of a fascinating thing a little bit like some of you might remember sitting by the Cuckoo's egg BY CLIFF Stoll where he found the East German hacker way back in the 1990s a little bit similar kind of tells the story kind of tells the cat and mouse game of trying to deciding that it was necessary, and then trying to get data out of these very very quick. Find systems classified beyond top secret in order to share information with world. So that's my lightning talk the short story is please read permanent record by Edward Snowden, I think you will. I think you will enjoy it I think you'll find it fascinating I think you'll learn a lot and not not making judgment not saying, right, wrong or anything like that I'm saying that if you want to know something, and we're hackers we like to know things. This is a great place to, to learn. So that's my lightning talk thanks very much SWAT me oh you're back thank you I think you were actually here an hour earlier before and that might be the issue we had 12 kill you're here, you're up next, please go ahead and enable your audio, video, share your screen, as you like and you have the next lightning talk.
Well, I will shock you it's getting ready we're also inviting one other person to the lightning talk to see if we have time on some people have noticed that what we're doing is we had pre recorded talks for most of the speakers, you're figuring out why we did that right now. We did this intentionally we said, How much time do we want to spend debugging Audio Video Problems and, you know, turn your microphone on and here's how to you know get your client working and stuff like that technology is hard. Yeah, so we're waiting for swapnil to join. As soon as we can and I just invited one other person to do the chats and planning on how fast email gets back and forth across the continent.
We have about another
time never heard this story of the 500 mile email.
Oh, it's an old internet trope so the sysadmin was got a report of an email that couldn't be sent more than 500 miles. And the basics of it is, they did some testing and they determined that this was actually the case and what it was is that they had set the TTL far too low on their mail server. And so it was based on so when it would connect out, depending on the speed of light, it would actually disconnect the connection because it wasn't you know it was the latency was too high. So they mapped it out because you know there were University sysadmins because it's relatively old storage from the 80s, and that they, they mapped it out to 500 miles and there was like, there was an undocumented thing that happens when you set the TTL to zero. That ends up just being, whatever the speed of light is.
I have heard that story before and, yeah, thanks very much.
Let's see. Gavin just joined us Gavin if you can figure out how to go ahead and unmute and share you can go next because swapnil is not feared about that, and you might be the last lightning talk.
Hey, look at that, we've got tools. Right. Can you hear me. Yeah, you're a little soft but we hear you.
I can boost on my end, but if it's easier for you to do it, that also works
that boosts work. Thank you. Please proceed.
All right, so I'm just gonna do a quick little
show of some random tools
I had lying around that I personally get a lot of use out of
these are next pliers wrenches.
The big interesting thing with these is that they're very compact for how wide you can get the wrench to go around something.
And unlike a normal adjustable bench,
the levers actually cause the jaws to close in a parallel fashion. So you can kind of use them for clamping action, as well as that really prevents slippage on things like nuts, and then make them no large range of sizes from small enough to fit in your pocket to large, you know, super funny sort of plumbing. I have here an eye gauging absolute caliper. I find these very handy for 3d modeling random measuring. And the neat thing about an absolute origin caliper. Is that the position is always retained, even when it's off, so you can move it around arbitrarily, and you can just turn it on and see exactly where it is 200 for the millimeter.
This is something for people who are in the RF side of things. Only a couple of people will make such sell these. I might just put links in the chat later for these sorts of things, so that people can find them. This is a set of adapters so basically for RF connections, you can take, pretty much any RF connection to any other RF connection. You just picked two. And they all have a shared universal centerpiece and they all just screw together to give you pretty much arbitrary connections in the house to make a cable which fills in the middle piece. So, I find this handy because I never have the right RF cables to things, and tell I got this. I'll have them all got this.
Yes 121 electric screwdriver. I believe these are open source I'll have to double check. But the firmware at least is open source and the various custom firmwares you can load on to them. Just a pretty nice little electric screwdriver they've got a nice gearing mechanism in the front. That gives you a decent amount of torque. Good for normal schools for computers and stuff, just save some time.
I think those are all actually kind of show for the moment. So, thank you.
Nice Hey, that was fun and I appreciate you putting it together in the time available, are you doing, are you in the matrix chat, I think it would be nice if you could type in just a, like a one word summary of each of those tools yes presented. That'd be fun follow us tool mutters.
Yes, I will be happy to do that.
All right, so we are just about at the end of our time. swapnil is still not showing us anything to your rescue, so I can help now.
Yes, I can hear you can you hear me.
Yes. Are you ready to present. Oh, I'm not presenting. Oh, you're not presenting I thought you were here to present.
Oh no, no.
All right, so thank thank you so standby. We are on close enough to the end of our lightning talks, all the way to, to call it a day. So, for those of you that want to see someone who's funny and entertaining. In the situation tune into hackers Got Talent on Saturday Jason Scott will be running it I may be a co host or challenge. And that's going to be a lot of fun lightning talks are intended to bring people to the screen, who for whatever reason are not on the main program might have been late breaking news might be something fun, that is riffing or reflecting on one of the current topics in in hope, or it might be a talk that was for whatever reason, not, not accepted and you want to give a five minute version. So there are teas. They're fun, they're interesting, and you're welcome to submit the next round of lightning talks. Do you have closing words for us your your your.
Oh, I'm a huge fan of Jason's got he recovered so well. During that snaffle that we had during hackers Got Talent. I think that was great. Yeah, Jason is going to be able to recover.
So, so that's why I'm saying he does it better than I do, by far, but we did have some very good lightning talk so I'd like to like to say thank you to everyone that gave a lightning talk now and again. Your Happy New Year Welcome everyone who's listening watching if you're a ticket holder, you can get in touch. And we'll post the link as the day approaches.
Right. Any last words before we call it a day.
Hack all the things, drink all the booze.
Exactly. Our next talk starts at the top of the hour is reform or expire, the battle to reauthorize spicy programs is one of several very very exciting touch from the E ff ff affiliates that we're having here at home. So we'll call it a day now and we will see you at the top of the hour. Thanks all thanks to our lightning speakers. And thanks to all the participants and all the inputs in the chat room.