All Completed projects Posts

Eoshield

Distributed applications lack reliable means of verifying the trustworthiness of their users and blockchain users have little information regarding the trustworthiness of distributed applications. EOShield was an hackathon competition entry at the 2018 EOS Global Hackathon which demonstrated the creation of a PKI-inspired distributed trust model to reduce risk on DApp ecosystems. The project was pitched as a business but is currently a side project which may see open-source release to the EOS community.

Read More...

The Adventures of Hackergirl

The Adventures of Hackergirl One of the greatest shortcomings of the information security industry today is the egregious gender gap among information security professionals. The fact that fewer than one in ten cybersecurity professionals are female directly increases the risks faced by our society in cyberspace. Although successful and admirable efforts have been made to incorporate women into the software development world through organizations like Women Who Code, comparatively little thought has been paid to the gender gap in information security.

Read More...

Typeface

Typeface Typeface was the winner of the first Hoya Hacks hackathon at Georgetown University. The goal was to build a device that would allow even a fully paralyzed individual to communicated at a reasonable rate with loved ones. The proof of concept device leverages the Muse Headband - a consumer product prices at less than $300 and targeted towards helping individuals meditate and improve mindfulness. The UI of the project was inspired by stories of “tap codes” used by Vietnam Prisoners of War to communicate with each other without relying on the more complicated Morse Code.

Read More...

Pi Guard

Pi Guard Pi Guard was a hackathon project focused on filling the gap between consumer security options for personal computers and comparable offerings for embedded and internet of things products. The device hosts a simple web application which acts as a wrapper for a number of automated scans that take place on the local IP range. The automated scans are designed to be modular and flexible so that multiple ‘plugins’ might be written for the platform and the UI is oriented towards non-technical users.

Read More...

Pi Spy

Pi Spy Pi spy was an entry my hackathon team made with the goal of demonstrating a novel attack vector against unencrypted network traffic. The project revolved around a malicious NIC installation that included a raspberry-pi running tcpdump and a passive network tap that intercepted all traffic from the desktop’s ethernet port. By powering the raspberry-pi off of the Molex adapters from the PC’s PSU we were able to ensure that the pi ran continuously whenever the PC was turned on.

Read More...