Slideshow: Fashion Statements from DEFCON 2010
Tattoos, mohawks, sheep, and 'pimp' necklaces were just some of the scenes from the hacker conference in Las Vegas earlier this month.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=700&auto=webp&quality=80&disable=upscale)
A Black Hat attendee shows McAfee a little love and gets the security company's logo tattooed onto his head.
Photo by Apneet Jolly
"NeOnRain," who gave a presentation at Defcon on building and hacking lie detectors, mugs for the camera with a new hacker hairdo.
Photo by Apneet Jolly
A Defcon attendee gets a mohawk in the Electronic Frontier Foundation (EFF) booth. The EFF offered $15 mohawks as a fundraiser.
Photo by Apneet Jolly
The world's longest mohawk gets a trim at the EFF booth.
Photo by Apneet Jolly
A beverage-cooling competition entry at Defcon.
Photo by Apneet Jolly
One of the challenges posed in the Capture the Flag hacking contest at Defcon, where teams of hackers show off their skills.
Photo by Apneet Jolly
Defcon's infamous Wall of Sheep, which posts users at the conference detected logging into email, websites, or other network services without the protection of encryption over wireless.
Photo by Apneet Jolly
Ukulele, mohawk, tattoos, and electrolytes - what more do you need at a Defcon session?
Photo by Apneet Jolly
Data recovery firm "GetBackMyPorn.com" advertises its mission of recovering anything and everything lost on your hard drive.
Photo by Apneet Jolly
"Vyrus" sporting his NVP (Narcissistic Vulnerability Pimp) necklace at Defcon.
Photo by Apneet Jolly
Microsoft gives away buttons promoting the spirit of cooperative vulnerability disclosure.
Photo by Apneet Jolly
Microsoft gives away buttons promoting the spirit of cooperative vulnerability disclosure.
Photo by Apneet Jolly
Microsoft gives away buttons promoting the spirit of cooperative vulnerability disclosure.
Photo by Apneet Jolly
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024