Defcon's hotel business-center won't print from links or USBs

If you’re interested in locksport or hacking consciousness, there’s some of that. But mostly it’s for coders and people who would like to be coders.

My strategy is to use a sacrificial laptop, which I wipe afterwards. Usually with dual-boot to windows and linux. I use no passwords that I’ve ever used anywhere else, and I don’t ever log into anything I care about from that machine.

If you use a cell phone and wanted to follow the same strategy, a cheap burner phone would be in order.

I think it increases my enjoyment of the event if I don’t have to care whether I am hacked or not, for example if somebody says they can remotely exploit a fully patched Windows machine I can say “here’s one, prove it!”.