Lilly Ryan

Lilly is a historian-turned-hacker based in Australia. She writes and speaks about software security, digital rights, facial recognition, death on the Internet, teamwork, and the telegraph.

Lilly Ryan, wearing bat-shaped glasses, baring her teeth.

Hack the Docs: how security professionals use documentation

We write documentation to help our colleagues and users find their way through our systems - but your carefully-crafted documentation can also help attackers learn what your systems do, and give them unintentional pointers on where to start breaking it.

Made to Measure? The Biases and Boundaries of Biometrics

Smart devices have been permitted to measure many aspects of our everyday lives, but without a strong grounding in the ways that human measurements have been used and abused in a pre-smartphone era, we risk retreading some of the more sinister paths history has drawn us down.

Vampires in the Browser: banishing uninvited Javascript from your web app

There are many sneaky ways that you may find yourself with someone else's Javascript inside your app without realising you've technically allowed it to be there. This talk is here to help you solve this problem.

What We Do in the Shadows

Every organisation's infrastructure has its shadow, the unofficial system of servers, accounts, and hardware that crisscrosses and bypasses the sanctioned pathways. This talk is a space for both confession and redemption: in it, we will delve into the psychology that leads to the development of shadow IT, the opportunities that can grow out of this corporate underground, and how to get these systems out of the shadows and into the light.

Apathy and Arsenic: a Victorian Era lesson on fighting the surveillance state

A tale of a two hundred year old method for fighting the surveillance state, based on the advocacy led by 19th century scientists to abolish the domestic use of arsenic. This talk offers advice on how to help everyday people have more power over their own information and how to sustain hope for the future.

How to Disappear Completely

This talk provides an overview of the latest urban camouflage technology and how to deploy it in order to foil facial recognition. We'll dive into the ethics of biometric identification, the way current legislation affects this technology, and what is needed for facial recognition technology to be both useful and just.

Wildman Whitehouse and the Great Failure of 1858

This is a tale of long-winded rants, spectacular sideburns, and gentlemen scientists behaving badly. It is also a lesson about the importance of honest reflection in technical teamwork.

Rage against the Ghost in the Machine

Outside of 'Black Mirror' episodes and art installations, the question of personal data and digital legacies is rarely seriously considered. This talk is a space to take stock of how the software we write today could be used in fifty years, and what design decisions we should make to ensure we can respect the wishes of the dead.

Scientific hooliganism: what we can learn from the first hack in history

This is a tale of business secrets, flame wars, stage magic, and magnificent sideburns, direct from the records of Edwardian England.

How to do an Acknowledgement of Country

How and why you might want to do an Acknowledgement of Country in your conference talk

Watching your language

How to make the software community better for non-native English speakers