If you’re interested in locksport or hacking consciousness, there’s some of that. But mostly it’s for coders and people who would like to be coders.
My strategy is to use a sacrificial laptop, which I wipe afterwards. Usually with dual-boot to windows and linux. I use no passwords that I’ve ever used anywhere else, and I don’t ever log into anything I care about from that machine.
If you use a cell phone and wanted to follow the same strategy, a cheap burner phone would be in order.
I think it increases my enjoyment of the event if I don’t have to care whether I am hacked or not, for example if somebody says they can remotely exploit a fully patched Windows machine I can say “here’s one, prove it!”.