Banner

Version française en bas

English Version

Vehicle thefts - Insecure vehicles should be banned, not security tools like the Flipper Zero

Sign

Find and contact your MP

Media Coverage

CBC: Banning hacking devices won’t prevent car thefts, security experts say

The Letter

Vehicle theft is an issue that affects us all collectively. As cybersecurity and technology professionals, we recognize the importance of acting rapidly to reduce its impact on Canadians. That being said, we believe the federal government’s proposal, particularly the prohibition of security research tools, is ill-advised, overbroad and most importantly, will be counterproductive.

Innovation, Science and Economic Development Canada (ISED) will pursue all avenues to ban devices used to steal vehicles by copying the wireless signals for remote keyless entry, such as the Flipper Zero, which would allow for the removal of those devices from the Canadian marketplace through collaboration with law enforcement agencies.

We believe this policy will not work because it rests on a misunderstanding of the underlying technology

This policy is based on outdated and misinformed technological assumptions, making it unfeasible to implement and enforce. Security tools like Flipper Zero are essentially programmable radios, known as Software Defined Radios (SDRs), a technology which has existed for years, and in some cases can be built using open-source or simple over-the-shelf-components. These radios are also fundamentally the same as those used in numerous devices across various sectors, including smart household appliances, drones and aerospace technologies, mobile phones and networks, as well as industrial control systems. Consequently, prohibiting such functionality is virtually impossible and could stifle the Canadian economy significantly.

We believe this policy will degrade national security, by incentivizing manufacturers to design insecure products, as security research is criminalized and right-to-repair is penalized

This policy fails to recognize that these tools are not the enemy, rather, insecure products are. Unlike decades ago when the industry relied on security through obscurity as a strategy, we now can attest that the democratization of security research tools is a balancing force for manufacturers to improve the safety of their products. Today, many industry actors rely on such research, just like we have Federal & Provincial1 government programs that support & reward security vulnerability disclosure that benefits us all. Implementing such a policy would have a chilling effect on these efforts, potentially undermining their positive impact on society.

Additionally, with bills such as C-244 (Right to Repair), that recently passed unanimously and C-294 (Interoperability) that gathered support from multiple parties, we believe this overbroad policy will penalize legitimate analysis and repair use-cases, that were just made available to canadians.

Finally, we believe this policy represents a waste of judiciary resources that could be better used to collaborate with experts from the cybersecurity industry to identify ways to prevent and deter such crimes

Because of the arbitrary nature of such a policy, we believe the judiciary system will be faced with a slew of litigious cases around the many uses of these security tools. Instead, these resources could be focused on creating constructive communication channels between cybersecurity experts, car manufacturers, insurers, and the judiciary system to identify ways to improve the security of automotive keyless entry and push-to-start systems, and enforce minimal levels of security for future products, as it is the case in other industries.


English version above

Version française

Signer

Trouver et contacter votre député

Couverture Médiatique

Le Téléjournal avec Céline Galipeau - Le 28 février 2024 - 40m40sec

Radio-Canada: Ottawa fait fausse route en bannissant les dispositifs de piratage, selon des experts

Lettre

Vols de véhicules - Les véhicules non sécurisés devraient être interdits, pas les outils de sécurité comme le Flipper Zero

Le vol de véhicules est un problème qui nous affecte tous collectivement. En tant que professionnels de la cybersécurité et de la technologie, nous reconnaissons l’importance d’agir rapidement pour réduire son impact sur les Canadiens. Cela étant dit, nous croyons que la proposition du gouvernement fédéral, en particulier l’interdiction des outils de recherche en sécurité, est malavisée, trop générale et surtout, contre-productive.

ISDE examinera toutes les possibilités pour interdire les dispositifs utilisés pour voler des véhicules en copiant les signaux sans fil du système de télédéverrouillage, tels que le Flipper Zero, ce qui permettrait de retirer ces dispositifs du marché canadien, en collaboration avec les organismes chargés de l’application de la loi.

Nous croyons que cette politique ne fonctionnera pas car elle repose sur une incompréhension de la technologie sous-jacente

Cette politique est basée sur des hypothèses technologiques obsolètes et mal informées, rendant son application et son exécution irréalisables. Les outils de sécurité comme le Flipper Zero sont essentiellement des radios programmables, connues sous le nom de Radios Définies par Logiciel, ou Software Defined Radios en anglais, (SDR), une technologie qui existe depuis des années et qui, dans certains cas, peut être construite en utilisant des composants open-source ou simples disponibles dans le commerce. Ces radios sont également fondamentalement les mêmes que celles utilisées dans de nombreux appareils à travers divers secteurs, y compris les appareils ménagers intelligents, les drones et les technologies aérospatiales, les téléphones mobiles et les réseaux, ainsi que les systèmes de contrôle industriel. Par conséquent, interdire une telle fonctionnalité est pratiquement impossible et pourrait étouffer considérablement l’économie canadienne.

Nous croyons que cette politique va dégrader la sécurité nationale, en incitant les fabricants à concevoir des produits non sécurisés, car la recherche en sécurité sera criminalisée et le droit de réparer pénalisé

Cette politique échoue à reconnaître que ces outils ne sont pas l’ennemi, mais plutôt que les produits non sécurisés le sont. Contrairement à il y a des décennies, où l’industrie s’appuyait sur la sécurité par l’obscurité comme stratégie, nous pouvons maintenant attester que la démocratisation des outils de recherche en sécurité est une force d’équilibre pour les fabricants pour améliorer la sécurité de leurs produits. Aujourd’hui, de nombreux acteurs de l’industrie s’appuient sur une telle recherche, tout comme nous avons des programmes gouvernementaux Fédéraux et Provinciaux2 qui soutiennent et récompensent la divulgation de vulnérabilités de sécurité qui nous profitent tous. La mise en œuvre d’une telle politique aurait un effet paralysant sur ces efforts, compromettant potentiellement leur impact positif sur la société.

De plus, avec des projets de loi tels que C-244 (Droit à la réparation), qui a récemment été adopté à l’unanimité et C-294 (Interopérabilité) qui a recueilli le soutien de plusieurs partis, nous pensons que cette politique trop générale pénalisera les analyses légitimes et les cas d’utilisation de réparation, qui viennent juste d’être rendus disponibles aux Canadiens.

Enfin, nous croyons que cette politique représente un gaspillage de ressources judiciaires qui pourraient être mieux utilisées pour collaborer avec des experts de l’industrie de la cybersécurité afin d’identifier des moyens de prévenir et de dissuader de tels crimes

En raison de la nature arbitraire d’une telle politique, nous croyons que le système judiciaire sera confronté à une multitude de cas litigieux concernant les nombreuses utilisations de ces outils de sécurité. Au lieu de cela, ces ressources pourraient être concentrées sur la création de canaux de communication constructifs entre les experts en cybersécurité, les fabricants de voitures, les assureurs et le système judiciaire pour identifier des moyens d’améliorer la sécurité des systèmes d’entrée sans clé et de démarrage par bouton-poussoir des automobiles, et imposer des niveaux de sécurité minimaux pour les futurs produits, comme c’est le cas dans d’autres industries.

Signatures

If you agree with this letter, please sign it and share it. Signatures are added to the site roughly once a day, manually.

Si vous êtes d’accord avec cette lettre, veuillez la signer et la partager. Les signatures sont ajoutées au site manuellement, environ une fois par jour.

Name/NomTitle/Titre
Guillaume RossDeputy CISO, JupiterOne
Pierre-David OriolCybersecurity Product Executive
Gabriel TremblayCybersecurity CEO
Nelson LamoureuxSchool principal & CISO CSSMCN
Axel SchulzDirector Cybersecurity Operations
Émilio GonzalezCybersecurity Professional
Simon CarpentierInformation Security Principal @ Desjardins
Dr. Alexander Dean CybulskiSecurity Awareness Professional - Utilities Sector
Patrick MathieuPresident, Hackfest Communication
Nicholas RomynSecurity Architect
Sivathmican Sivakumaran
Mike LizotteOffensive Security Consultant
Laurent Chouinard
dystopie
Eric Hogue
James Arlen
Fernando MontenegroCybersecurity Industry Analyst
Jean-Sébastien DelormeNorthSec - VP Training
Adam AnklewiczManager, IT Endpoint Engineering
Tim FitzgeraldManager of IT Systems
Sean
Charles Ferguson
Rahul
Nathan BerangerSr. IT Professional
Guillaume MorissetteGuillaume Morissette
Philippe M.Technical Solutions Architect
Sylvain P
Pierrick VittetAnalyste en cybersécurité
TUX
Laurent Desaulniers
Mat X
Brad ClareIT Consultant
Garth BoydSecurity Architect
Serge-Olivier PaquetteDirector of Innovation
Dmitriy BeryozaSenior Security Researcher
Simon NoletTesteur d’intrusion transversaux
Colin StéphenneCybersecurity specialist
Pavel SushkoChief Executive Officer
Mandeep
Felipe SáezSecurity Engineer
Clayton SmithSecurity researcher
saltAnalyste en sécurité informatique
Simon DécosseTeam Lead Ethical Hacker
Eric BeaurivageAdministrateur de systèmes et réseaux
Alexandre CôtéSecurity Researcher
Michael Jeanson
Lex GillAvocate
Etienne Prud’homme
Eric HebertInformation Security Professional
Patricia Gagnon-RenaudCybersecurity Analyst
Antoine Gauthier-DrapeauAnalyste en cybersécurité
Sébastien DuquetteDirector of Software Development, ex-Application Security Lead @ Devolutions
Cyndie FeltzCo-founder
Jacob DiamondPentester
Mark CohenCIO
Adrian Christie
Francis CoatsExpert en sécurité
Louis Nadeau
Martin D
Maxime ParadisAnalyste Technique
Régis Belarbi
Simon LoiselleLead security advisor
Simon CharestSenior Software Developer and CEO at SLCIT
Andrew BelliniAuthor of Beginner’s Guide to IoT and Hardware Hacking
V DanielAccount executive
Eric C.
Alex Kozin
Alexandre Blancstrategical and security advisor
Free SpiritBitcoin miner
Felix DoyonDevOps Engineer
Alec BareaGlobal information security director
Vaidotas Brazauskas
Tom Ewan
Alexis D.
Eugene GrantSecurity Principal TEC Ops
Mitch M
Denis Lessard
David Guerin
Pier-Luc Moisan
Lee BrotherstonInfosec Rando
Étienne LévesqueDéveloppeur web
Gaspar-SecCyberSecurity Analyst
Jean-François
Kenneth Gallagher
Bruno Morel
Cid Summers
Reda BaydounSr. Principal Software Dev., CISSP
Marc-Antoine ChabotTechnology expert, ECCC
Sergey FaleevSenior IT manager
Neumann lim
Marc-Etienne M.LéveilléChercheur en logiciels malveillants
Olivier BilodeauPrésident de NorthSec et Directeur de la recherche en cybersécurité chez GoSecure
Benjamin Courchesne
Alexandre Larocque, P.Eng.CEO @ Ardent Security
Samuel A.Application Security Analyst I
Frédéric FortinPrésident, iconnek.io
Marc Ouellet
J. Fournier
AuréSerrurière
Ben RenaudDirector, Cybersecurity, PetalMD
Vincent Le HémonetConsultant sécurité réseau
C GCybersecurity specialist
Mathieu HetuCEO - MH Service Technologies
Maxim ChartrandChef d’entreprise, GTI Télécoms
Maxime Labrecque-RaymondConseiller en cybersecurité
Cedric ThibaultPartner & CTO
Max Wot
Jean RhoIntegrateur, système de sécurité
Jean-Michel V
Charles-Etienne Crevier
Steve WaterhouseProfessionnel en Sécurité de l’Information
Fabrice DelorCybersecurity Architect
Vincent lambert
Molon Labe
Gabriel LongpréAnalyste Sécurité & Réseau
Marvens DecayetteSecurity analyst
Werner BuratTechnical Solutions Consultant
Flaster JeddOffensive security consultant
Nicholas MilotCo-Founder @Yack
Bernard BolducConseiller en Cyber Sécurité
CaidoCo-fondateur
Marc-André DumontCybersecurity Team Lead
Philippe LCybersécurité opérationnelle
Philippe Hamel
Pascal FortinPDG - Cybereco
Guillaume Raymond
Patrick Davidson TremblayDirecteur, Sécurité offensive, Simulation d’adversaires
Steve LavoieDirecteur TI, CISSP
Stephane PelletierApplication Security Analyst
Émilien PierruBackend developer
Guillaume Nourry-MarquisPrésident Commit2Security Inc.
Antoine Reversat
Maxime CarbonneauCybersecurity Professional
Derek W.Infosec Dude & Flipper Zero User
Marc
Kastelo Caron
Simon ClavetProgrammer
Sébastien Graveline
Sébastien Massé-Croteau
Jason M.Cybersecurity consultant
Danny FullertonCISO, VP
Olivier Dion
Sébastien HuneaultEnseignant en Informatique
anarcat
Sonia Fath
Alexandre BoyerLead info sec engineer
Amandine Gagnon-HébertAssociate Red Team Consultant - Mandiant, VP Engagement @NorthSec, prévention des méfaits > coercition
Justin BrulotteSenior AI Developper
Fred QuennevilleEthical Hacker
Dominique
Trevor hough (loudmouth security)CSO
Martin LégerSysadmin
Olivier MichaudTechnicien en TI
Yvan Beaulieu PhDConseiller senior en sécurité de l’information
Justin Lavoie
Philippe PanaiteLead System Administrator
MarcCybersecurity consultant
Mark
Saïd IzawiSecurity Solutions Architect
Dany BoivinFlippingForFlipper
Jason Keirstead
LG NobreCybersecurity professional
Adam ShostackAuthor, Threat modeling: Designing for Security
Yohannes Aberacht
Marc LefrancoisLead Developer
Jeremy Aube
Eric M. GagnonChef D’équipe, Simulation d’adversaires
Daniel DrouetTech investor and entrepreneur
Tim PartridgeSenior Security Architect - IBM Canada LTD
Oley V
Mathieu Saulnier
Ross DerewiankoSenior Staff Systems Eingeer
Alexandre A.
Rob WoodFounder
Anne Katherine
Jason ErnstPrincipal Software Engineer, PhD Wireless Mesh Networks
Alexandre GuédonCybersecurity Professional
Tom Gwozdz
Lee Nichols
Will Whittaker
Samer EssaInformation Security Manager
Nicholas St-JacquesMr.
Ty Lamontagne
Zachary M
Mike Clark
jeff woodsVP Software
Daniel LynchSenior Cyber Security Advisor
Trevor Orsztynowicz
Eric
Cody Trew
Kole Barnes
Christopher Reid
William Bergmann BørresenWilliam Bergmann Børresen
Ssmidge
Philippe DépelteauIT & Cybersecurity Director
Orin Johnson
BortCybersecurity Analyst
Christophe Langlois
Mike K
Katie H.Senior Cybersecurity Consultant
Adam White
Tyler Nicholson
Hugo GenesseCybersecurity Researcher, VP-Conference @NorthSec
Jamie Bode
Olivier LaflammePrincipal Consultant @RedRainSecurity & Senior Red Team Operator @F500 - CISSP, BSCP, OSCP, CRTO, CRTL, EWPTX, ECPPT
Ronan Scott
Tyler Austin
Kevin2600
Jon alikakosJ@nnny
Matt MooreMr.
Ari
Lukas S.
Andrey FrolSoftware Developer
Noah ClementsHacker
AnonManWeb Dev
Malvin DinService Technician
Simon BouchardCyberSecurity Analyst
Andrew R.
Evan BrundrittIT Specialist
Olivier CaronCyber Security Specialist
Haram Leerandom 11yro kid who wrote a full essay to Jonathan Wilkinson to save flipper
Pat Papineau
Aiden
Andreanne BergeronCybersecurity Researcher
Bib
James RenkenSite Reliability Engineer
Lucas Kovacs
the hacker
Jesse PoikonenMr
Kienan S.
AnonIT Service
Francis OuelletJedi Master
Amar JunejaCybersecurity Consultant
Mark Linton
Scott Flowers
Mike BurgenerVP Cybersecurity, Vancity Savings Credit Union
Johnny WilliamsJhonnyW55
J.A. RogersConsultant
WenDirector of Product
Jarob PortilloDental Technician
Sukh Panech
Daniel Beaulne
Andrew SimpsonSoftware Engineer
Anonymous ZSoftware Developer
Ja d’AttaqPen Tester
Phil StewardSr. Project Manager / Security Consultant
Nandan Reddy S
James Taylor
Maryanne FrancisMrs
Jay TurlaPrincipal Security Consultant
Dhruv Majumdar
Neelanjana Mandal
Jérôme Lebel
Faith MFaith M
Mohammed ShineShine
J
Matthew W.
Sam G
Robert Brown
Flipper Lobster fishing guyCaptain flipper
Harper KellyMr.
Tom KempDr.
Andrew
Paul Crampton
“Uncle Harkinian”Broadcast engineer
Aria BurrellSr. Software Development Manager
A.Gill
Elijah
Fukiro
htmlh4cker
Hunter Beachcow
Parker KochParker Koch
Leo Xu
Hamdi BahriniApplication Security Analyst
Flipper supporter
Snorre Trehjørningen Svedmansnorre@svedman.no
Thomas AlonsoCTI Director
Paul BentonDirector of IT
Jake
Koen
François ProulxSenior Product Security Engineer
Paul R.VP Operations, GGR Security
MasterKMr.
JP
Julien DesrosiersWeb developer
Mike T.
Jay RadcliffeDirector, Medical Device Security
Pavel Shirshov
Mitchell SchwartzDeveloper and Process Designer
Mark Hahnsysadmin
Guy LegaultIT tech
AlexanderInformation Security Officer
Paul ReinheimerPresident, WonderProxy Inc.
Martin LGSoftware Engineer - Flipper Owner
D. NetoDevelopment Manager - Big 3 Banks
Ian W
Robert PouliotSystem administrator
Zkink
M.PQuick question
James (purpleidea)Author of https://github.com/purpleidea/mgmt/
MS
Jeffrey RauDr.
Tyler Kuipers
Spyers
Fergus Argyll1337 h4x0r
André Medeiros
M. Forget
J RossySoftware Engineer
Sam Bostock
Gerry Power
Huzefa Dargahwala
Anouar MansourSenior Cybersecurity Specialist
Andrew HenryMr
Félix CharetteSenior Application Security Engineer
Rhenium
River WhiteSoftware Engineer
Andrew BrownSecurity Developer
Jeremy BankerSenior Security Developer @ VMware
Tom Hotston
J. King
Laura Rodgers
Adrien LasalleNetRunner | @Speaker | Offensive Security
Scott Hamilton
Tiger F
Paul Pereira-Brunner
Julian MaingotSoftware Engineer
Adam McDanielTechnical Product Manager
Vincent Dansereau
Elizabeth LCIT Logistics
Andrey Petrov
James RycmanSoftware Development Manager
Tom Strickland
Kyle Stevenson
Arthur Margulies
Daphne ReedSenior Director of Security
AAL
Ariadna Urazbaeva
Sultan Qasim KhanSecurity Researcher
Bryce BennSoftware Developer
Jason Kaczor
Amin Shah GilaniSoftware Engineer and Hobbyist
Hugo
Nicolas Krause
James WeatherellTechnologist
Samy GhannadSecurity Researcher
Kevin Cox
Maxim Baele
Jonathan Villemaire-KrajdenSenior Software Developer
Joey ColemanDr
Nick TaylorManager, Infrastructure Security @ Shopify
Jérôme CarreteroEmbedded software engineering specialist
Raf
Ryan DragaDevOps/Application Security Engineer/Maker
Michael HollowaySystems Administrator
GabrielDigital Autonomy Advocate
Pierre-Nicolas AllardSr. Penetration Tester
Michael LongvalMD
Adam Schumacher
Ryan Luker
pelmen
Michael Perklin
Randy Saint-Louis
Thomas KilbrideSystem on Chip Security Architect
Aaron Janeiro StoneQuantitative Analyst
Martin
MaraMiss
Daniel MitchellCybersecurity Practitioner
Rob KeizerFounder / CTO
Aurabindo PillaiEmbedded Systems Engineer
Sal RahmanSoftware Development Engineer
Brian Tammi
UTKU KARAASLANSW DEVELOPER
Andrew CohoeRadio hobbyist
Michael SaringerLeader of Cybersecurity
Carmen CCloud Solution Architect
Mohit Chauhan
JF Godin
Albert R
Steve Eh
Andrew Dutton
Andrew Gibson
vilez
Brice YangueCybersecurity student
JohnF
Scott
Shanti Maharaj
Mitch A
Justin UnrauDigital Literacy Librarian
J Dunford
Mikkel PaulsonFormer leader, Pirate Party of Canada
SPACECADET
Beau GundersonCTO
Aliaksei Sheshka
Brandon
Sacha Mallais
Mathieu MorrissetteApplication Security Lead
David KiddellIT Coordinator
Karim YaghmourCEO / Author / Speaker / Consultant
Ryan BarberSoftware Technologist
André MSoftware Architect
Jared T.
Asad Osmanhobbyist programmer
Helene S
Adam M.
Aiden Fox IveyUniversity of Waterloo - Computer Engineering
Callum Hay
Keith Daser
Danielle De Leo
Damian ZarębaMr
Jeff LavoieSoftware Developer and Researcher
Paul H
Olivier
Ethan Henry
Taylor L
Alex.SSoftware Engineer
XK
Korran NielsenStaff Software Engineer at Google, security
Jonathan Tougas
Charles BSoftware Developer
mlavgn
LeeW
Mario M
P BTier 3 Infrastructure Support Technician
Robert XiaoCS Professor @ UBC
Vianney GallCyber security analyst
Owen AndersonSoftware Developer
Kelly BanmanSoftware Engineer
Mike GozzoChief Product & Technology Officer, Ada
Andrew BeelerMr.
Cindy “Sinderz” Jones
Nelson AsinowskiLeturer in Computer Support
Jamie F
Eric Sedoreinformation Security
Abdelhakim Q.Software Developer
Nasheed Ur Rehman
Ross ZurowskiDesigner & Technologist
Chris Foster
A.KSoftware engineer
Saave Da PhlipperLord.
Bernard LebelDirecteur - Cybersécurité des TO
E. CalderonPenetration Tester
Espagne
Stefan TimotijevicHackers Without Borders
Thomas FoubertDevSecOps Engineer & Pentester
Vincent Salamanca-GagnonSoftware Developer
Benjamin DupuisIngénieur cybersécurité
Matthieu BorgraeveIT lead
Laurent DumontSenior Cloud Architect
Thomas ThetankEngineer
Justin DuvalIT Specialist
Tyler RatliffSecurity Researcher
Lucien Dubois
Jerome TremblayArchitech TI
Mikhaël E.
RICHARD CorentinIndustrial Software Engineer
SeanI.T. Specialist
Hakim Sid’Ahmed
JollyMongrelResearcher
Stéphane Beniak
Josué AlmeidaSoftware Developer
Noah Bailey
Nathan Van Ymeren
Steve BrechtSoftware Developer
calebdev
Flederossi
Baker
AlexCyber Threat Hunter
Philippe DugreCyber Security Analyst
Mark Strendin
Ayush SinghTechnical Lead
Eli WardSRE
Liam WilkinsonSoftware engineer
Chris T
AJ Magnusson
Eric LacasseSenior Developer
Ellen TeapoSoftware engineer, Apple Canada (opinions are my own and not my employer’s)
Zack H
olivia
Louis-André LabadieProduct designer
Mark Johnson
Brian McKeeIT Manager
Paula TejanoIT Specialist
James BrunetInstructor, Information Technology at Calreton University
Mark LeeMr.
Andre CourchesneConsultant, Inventor, Maker
Greg P
Colin Fletcher
Simon Erlic
Raphael SchmidtMr.
Edgar WidemanSoftware Dev
Patrick GibsonSenior Software Developer
Nikos koromposSenior software and systems engineer
Tyler MontgomeryPlease don’t ban Flipper Zero or other similar devices!!!
Peter Soava
Evan BrynneSoftware Engineer
xdnc3the government doesnt know how technology works, and is using the flipper zero as a scapegoat
John Rampelt
IntangibleMatter
cqb
Anonymous CanadianSoftware Engineer
Michael McKayCommercial director
AaronProgrammer
Josh Nagy
Charlie Hall
Tomas
Steven Lachance
Steve ScottInformation Security Professional
Matt Moor
Pascal CharestSenior Engineering Manager, Trust & Security
John Wynen
Julian WebbCompTech, SysAdmin, NetAdmin
Alexandre “alxbl” BeaulieuStaff Software Developer
Lucas L.Cybersecurity student
Punit Daga
Alex Richards
Julien Richard
Ryan McAfeePrincipal DevOps Engineer
Maeve Sproule
Donald Beveridge
Manas Gupta
Mario Di Bacco
Emma Segal-Grossman
Mark Rose
Tyler FisherSenior Information Security Analyst
HoggMr.
Karsten JohanssonSr. Information Security Advisor
V
Andrew Clapham
Francis LacosteCybersecurity manager
Ryan BunkerDirector of Product - Byos
Hugo Velazquez Perez
Brendan Campbell
Christopher Schafer
Brad
J. Lauzon
Michael MacLeod
Kent RichardsSoftware developer
James
Blaine Halee
Guillaume Couture-Levesque
Ben KoshyTechnologist
Bobby MacSavetheflipper
Royce
Jake Tivy
NimNim
Kal
Travis Kay
Vitaly FominSE, Tech enthusiast
Matt Cutts
Jon M
Adam
Nick B
Andrej Vasilj
Vasile MarinStudent in computer science
Kent Worsnop
Anonymous
Arnold T.
Brendan RaganSoftware Engineer
dork24
Samuel Hinkel
Antoine Turgeon
Jake EvansIT Specialist
Chris CapobiancoTeam Lead at Arctic Wolf Networks
Hriday BalachandranCISO and VP of Technology, DC Group
Cedric M
fxgnThe tomato demon
Ryan WestDirector of Infrastructure Engineering
Akshay Joshi
Concerned Citizen
Jonathan SidJonathan
Vivian Lee
Rudi Jubran
Nathan FriendSoftware Engineer
Mickael EConsultant en securité informatique
Dylan BeaulieuIT technician
Dh
Frank
Sean Hodgins
Radin Najafi
Andrzej Głuszak
Woongbin Kang
John Power
Martin SSoftware Development Student
Dan ScanlonCTO, Genesis XYZ, Inc.
Max Lee
Ryan Simmons
Ailo
jackjnmd
Bernardo Kuri
Behnoud Givehki
Rajas Sambhare
Austin HuangCS student, McGill University
JadeTech Enthusiast
Kyle FoxDEFCON Furs Badge Lead
Thomas Gwynne-TimothyEngineer
Evan ZaplachinskiCybersecurity student
Matt McKinnon
Vishal
Joel DeTeves
Jeremy
C G
Frank CSecurity Consultant
Andre D
Stephen Bourne
Rtepet
J.ZResearcher
Peter CaiSystems Software Developer
Kris Pucci
Usama SAI Researcher
Jeff LResearcher
Vanessa HenriCofounder, Cybersecurity Law Firm
Bassam MoussaCybersecurity Researcher
Eric D.
LysMs
Vincent Mercier
Jack Van
David Munoz
Jason WalronSoftware Architect
James David
Aleksi SaponSoftware Developer
DanielCybersecurity Student
Sakura H.
Geoff Denning
Igor Magun
Brandon DCybersecurity Student
Carl
Daniel S
James CSecurity and ISP engineer
NetCatSecurity Analyst
Hantatu BujklaĉSro.
Joshua Novak
Michael Coulter
Evan M
Harsh Makwana
Anthony D
Nabil
Ezra LazarSoftware Developer
Alexandra R
B Bauman
Joni Virtanen
Himanshu AnandSecurity researcher
Straithe
Dunc S
Mark JenkinsInformation technologist and hackerspace organizer
Kamache
Adrian
0xless
Sean ScrivenerSenior Security Analyst and Lead
Ovidiu EOvidiu E Ro
Martin HerfurtIT-Security Researcher
Kekko
Tim Perry
Cem Usta
Björn HanssonBjorn
Jean SnymanSecurity Research Engineer
James Christopher WiseHobbyist programmer
David JonesData Steward
Christian BourgeoisIT Specialist, Cybersecurity learner
Seth M
Logan MacLarenCybersecurity engineer
Egor Egorov
Trevor Bakerserver Administrator
Zak ZainiProduct Security Architect
Miguel
Gabriel TheuwsDéveloppeur d’applications
Don JohnsonSecurity Engineer
BramCTO
ERIC PARENTCEO EVA Technologies
quantum_ghost
Elijah Reale
Tim KingCyber Researcher & Educator
Ilya YatsenkoStudent
Krzysztof HajdamowiczMr
Nathan EinwechterSr. Director, Security Research
Jeff CourteauArchitecte Réseau
Pierre-Luc AuclairDéveloppeur
Jean-Christophe Giguere-MoreauConseiller Cybersecurite
Alexandre BoilySpécialiste DevOps
Alex MajorProfessionnel en Cybersécurité
Xavier A
St-Louis-Hebert
Yannick GagnonConseiller en sécurité de l’information
Gaëtan TrelluSolution Architect
Pierre-Marc
Aramis Veillette
Anthony St-PierreIT operations manager
Francis G St-PierreAnalyste en cybersécurité
Andre BrissetteCISO
Nicolas Deschenesingénieur de projet
Kevin TremblaySenior Cyber Security Consultant
Jean-Philippe JodoinDéveloppeur logiciel
Nicolas R.Software Engineer
Ludovic Bédard
Mathieu Mitchell
Alexandre Charron
Philippe GoudreauArchitecte infrastructure
Simon Boyer
Olivier Martin
bauve
BlankPentester
Emilie RollandinSenior Software Developer
Mathieu TherrienVA2IO
Benoit Larocque
Olivier Lemoine
Glenn ThibaultAnalyste IT
Alex Cormier
Tom RTechnical Engineering Manager
Éli Hamel
Emilie RollandinSenior Software Developer
Xavier GroleauDéveloppeur embarqué
Pascal L.
Arnaud LandryConsultant en cybersécurité
Cynthia L. McLaughlinSoftware Developer
S. BélangerIngénieur en cybersécurité OT
Mathieu R.
Alex TardifSystems Engineer, Palo Alto Networks
Walan BrousseauÉtudiant en Génie Informatique
Étienne Sadio
Franck GlebockiArchitecte Securité
Javier Escobar de la PazConseiller principal, sécurité de l’information
Alexandre LetourneauConsultant Cybersecurité
Pierre MétrasBidouilleur amateur
Maxime S.Développeur
Danny BoivinAnalyste en Cybersécurité
Jules ROTILIO
fbretoncitoyen du monde
Danny S.
David CohenConsultant Technologique
Patrick HamelSystems Engineering Manager
Félix QuennevilleConsultant en cybersecurité
h3xitInfoSec Tech Lead
Carl Patenaude-PoulinDéveloppeur logiciel
Dominic VilleneuveSystem administrator / cybersecurity analyst
Maxime Beauchamp
RomainCybersecurity Analyst
JcBMr.
Claude RoyClaude
Hernandez PierreConseiller Cyber-sécurité
Raphael Lanouette
Jean-Michel plourde
Mathieu LachaîneChef de la technologie
Jeff Gorchynski
Constantin BuruianaSoftware Developer
PRB Hughes
Boris CTech Leader
Mansour
DevonSenior Engineer
Hussein Jafferjees
Darren Yung
Artur L.
Brandon MarshallOffensive Security Researcher
Frederic BilodeauStudent
Sven NeuhausSenior security engineer
Cass OInformation Security Architect
Aaron MSoftware Developer
CharlesCybersecurity Expert
David RoizenmanSoftware Engineer
Joseph T.
Benjamin MillerCybersecurity professional
Ryan HigginsLead Systems Analyst
Todd SchertzingCyber Security Consultant
Fred LadouceurOffensive Security Consultant
Mohammed AnushRed Teamer
Dan ForgetTechnical Solutions Consultant
Andre S
Zack Hatfield
Tanner Marks
David L.
Susie
NikolayMSoftware developer
Gildas Cotomale
Johan
Daryl
Gregory Huard
Ray Otis
Yannick F.
Stuart Seeley
Sooshi
Jean-Francois ParéIT Manager
skimie2
FredSME Head of Security
Amir AbEntrepreneur/ Robotics Research and Development startup company
mh
Darren Bell (Loudmouth Security)Technical Project Manager
Brennan C
Eric
Soki The RexouiumSoki The Rexouium
Louise PowellPenetration Tester
Pierre-Louis ProulxProfessionnel en cybersécurité
Ryan Torrance
Pier-Luc Maltais (ramsexy)Bug bounty hunter
Antoine
Mason
Nicolai strukoffMr
MariusIT Admin
Bryan Jeal
Harry Elmokyan
Julien Duranleau
Lucie Baillargeon
John GossetSoftware Development Manager
AlexisAnalyst developer
Mark Rohen
Martin Renaud, CISSPMartin Renaud, CISSP
François St-ArnaudEmbedded Cyber Security Specialist
Sam CurrySecurity Researcher
Jakub B
Rivers
Simon BernierSecurity Developer
Jason Y
Aaron hayes
Jonathan Couture
Nick WatermanSenior Technical Director, Security Researcher
Brad Cees
V.Lessard
James GourdineAnonymous
Talesh SeeparsanFounder Bit79.ca
Abdulfatah
Jimmy UpsHobbyist
Michael S
Denis
Nicky DevBug Bounty Hunter
Brock L
Samuel PlantePentester
Johnathan DrozdowskiSenior Red Team Specialist, Canada Life
Sebastien R.Information Security Analyst
K4YT3XSecurity Researcher
Teodor P.
Kyle Creelman
MumbleHappy Feet
Josh Holden
The Area 51 Rider
Danny TranSoftware Developer
Dan H.
Artem
Ryan CAppSec engineer / researcher
Alex DowPerpetual Learner
PhrancouaCloud security consultant
Shannon Cossette
Cynthia Bruce-MarzenskaMs.
Wojciech Pilch
Ron MélotteLecturer in Cyber Security
Joey Lord
HugoFullstack Web Developer
Christoph HebeisenDirector, Security Research
David Lagacé
DaylenCybersecurity student
William CorcoranPenetration Tester
Kyle Loree
Shadowharvy
Paul Hart
Alaam AmershiMr.
Ian Phillipchuk
Latex
Edmon Abdul Nur
pestobestComputer scientist
Joanna R
enni
Jesse EmondSenior Software Engineer
Roman
Franck JeannotCybersecurity Specialist
Dominic VilleneuveCybersecurity analyst
Phil ThibaultManager, Cyber Security Architecture
DanTinker, tech enthusiast, airplane mechanic, dad
Hunter david NixonMr
Jasmin PareInfrastructure Architect
David LaganièreP.Eng., ing.
Gagan Jattana
Chet N.Security Analyst
Kevin GagnonEnseignant
Will
Rob Kerr
Rob KerrWeb Developer
NicoLoudSoftware
Nicolas ZnamenskiCybersecurity Consultant
Mark ZuzarteSr. Director - Application & Offensive Security - BDO Digital
Leon
Alex SimpsonElectronics Techinican
A.J. PotrebkaFounder, Campfire Technology
Grabitel
Amanjeev SethiSoftware Engineer
Barry
Mahira Mohtashami
PytonSecurity Enthusiast
D.
Ollie B
Guillaume
Gabriel GuzmanEncourager of Awesome
Justin FangradSenior Frontend Engineer
Alaam AmershiSoftware Developer and Cybersecurity Student
Rusty Fisher
Zacharia EllahamPenetration tester
Guy MoïseDevops
Hassen JammaliDirector, Cybersecurity and Compliance
Jamie Cannon
Laurent D.Cybersecurity Student
S CampbellMr
Mitra MirhassaniCo director of SHIELD Automotive Cybersecurity Center of Excellence
Richard Martin
P-M
Rob Jno
Anastasia CampbellStudent IT & Cybersecurity Analyst
Toby McGuire
Dr. Anthony LaiDirector & Researcher, VXRL
Gregory MortonInformation Security Officer
PAPMr.
H0e4a0r1t
Thomas Bork
Zaynab B
Alex D
Vincent YiuDirector
Jade NullPrincipal Security Consultant @ GlitchSecure
Alex
Myriam Beauchamp
Gabriel TessierCybersecurity manager
Erin T
K.J. WightRed Teamer/Cybersecurity Professional
Antoine Leblond
Mark DeBaets
Brnz2ThnkActivist Wannabe
Alex Zvaniga
StevenSoftware dev
Baptiste PSenior Software Developer
Steven HamerB.sc Physiques
Travis Stewart
Anton Ad
Ueric MeloSecurity Awareness Manager
Guy Simard
Louis-Olivier St-LaurentSoftware developer
Alain LefebvreCybersecurity Consultant
Jason H.Software Engineer Security Analyst
Nicolas GirotTech Lead Developer
Naomi Gilbert
Mathieu ChevalierPrincipal Security Architect, Genetec
Thib3113Software Developer
Brad “RenderMan” Haines
Nicole Schwartz
Andrew Suter
Joe Bowser
Omkhar ArasaratnamGeneral Manager, OpenSSF
Ash Mytchwall
Shira Wolven
Kanstantsin Bucha
Norbert GriffinPenetration Tester
Dustin HeywoodChief Architect of X-Force
Gr@ve_Rose
MichaelL
Pierre DesrochersPrincipal Technical Analyst
Jacquelin Martineau-RousseauCybersecurity Consultant
Brandon Eagan
Brendan FMr
Sylvain Kirouac
Jonathan CheryCyberSecurity manager
Karthik Kumar Viswanathan
Matthew Peters
Léonard L GagnonConcepteur logiciel embarqué
Nicolas Boulet
Sébastien LapointeCEO Cyberlaps
Clément CruchetTechnical Team Lead
Pier-Luc BraultEnseignant en informatique
Jean Narrache
JeffIT project manager
Pascal RoySoftware developer
Law
Poinsard A.
Alexandre HuppéEnseignant en informatique
Ahmed HadjeresCTO @ oamo.io
PAP
Mathieu GDirector, Security Fusion Center
Philippe Lacroix
Guillaume FilionAnalyste en informatique
MAconsultant en cyber sécurité
Richard LanielDéveloppeur de logiciels
Emmanuel Durand
Etienne BoisvenueData Scientist, security practitioner
SaveFlipper
Steve Rainville
Steve Mc NicollHobbyists
Patrick CM
Christian ParadisSenior Software Developer
Guillaume Bacon
Lucas M
Maxime BédardSoftware Engineer
Anthony CyrConsultant Cyber
Michael LabrecqueAnalyst - Automation / Web Developper
Patrick PilotteOperational Security Team Leader
Jacques SauveConsultant en cybersécurité
Steve B
Jean-Philippe Décarie-MathieuLead Cybersecurity Analyst // High tech low life dude
Kevin Poulin
Vincent ChartierIngénieur informatique
Claude Dupont
Jimmy BellCPI, Conseiller en tests d’intrusion
P.A.P.
Pierre Jodoin
Augusto sosa escaladaIT
Karan Aditya GhoshalCyber Threat Intelligence Analyst
Alexy Mantha
Max Leblanc
Richard ReinerManaging Partner
Eugen C.
JC DansereauSoftware engineer
Jeff CliffFree Software Advocate
Hariz ShiraziiOS jailbreak developer, tinkerer
Nolan
Matthieu
Pedro Miguel SanchezResearcher
Kaitlyn
Jonathan
Wade KlaverSysadmin and Security Professional
Ivy Fan-Chiang
Steven DeobaldCEO
Brendan Dery
ChrisStaff Software Engineer
Ryan Campbell
DeadlyFalcor
Ken WaltersMr.
M MSoftware Developer
Kurtis GSoftware Developer
Sid ChoudhuriHead of IT, Greenpeace Canada
Peyre PellissierMr
Mickael LavroffCybersec Expert
Ben Z.
AlexFlipper Fan
Jonathan GAccount Executive - Cybersecurity
Rob Masse
Nicolas Boulianenetwork software engineering at CoreWeave
Amy GilsonInformation Security Manager
VRM
Vicky DiamantopoulosPresident - Normalex Inc.
Mark MCybersecurity Professional
No. Thanks.
Matthew Armitage
Emilie St-Pierre
Gabriel
David Gagnon
Marc Godard
Dakota
Shinobi MaikanSecurity enthusiast
P. MénardCybersecurity Director
Martin LemayCybersecurity Executive/Coach/Mentor
Reid Hurlburt
CG
Shane SPenetration Tester
Jms
Miah JohnsonServer Operator
Adam Barnett
Brandon
corbin carroll
Stéphane GraberOwner, Zabbly
Francis Breault
Mitch BretonSecurity Analyst
Christian
David BilodeauPenetration Tester
Conor
Evan Pratten
Étienne
Aaron MacSweensecurity researcher
Dominic VilleneuveDirector cybersecurity
Jordan VSoftware Developer
Francis HCyber-Security Specialist
Richard PerrittTechnology Professional
Elias TurnerFull Stack Software Developer
Ismael Filali-mouhimCybersecurity analyst
Gerry Corcoran
TomSecurity researcher
Jack Perry, CISSPJack Perry, CISSP
Hypernova
DH
Chantell Petrell
James BraySoftware Developer
EdgarSecurity Engineer
Farhad Davudov
Erik.PTech enthusiast
Ali Kerman
Zach SchneiderIT Security Consultant
Marco D.
Pierre Jodoin
G. Cliche
Tchepikoff Eric
Jean-Philippe Gauvin
Nicolas D.Security analyst
Gabriel St-Laurent
Raphaël JobinAnalyste en cybersécurité
Erwann PondavenAnalyste principal GRC
Marc Lachapelle
Yves DesharnaisConsultant en sécurité de l’information
SydneyMs.
Patrick RoyConsultant en sécurité de l’information
Yan MigneaultRecherchiste en CyberSecurité
Phil
Frédéric Lemieux-SamsonDans le monde vaste des TI
Jonathan LamarreDéveloppeur logiciel sénior
Anne-Marie FaberCMO
Marc B. Sauro
Marc Andrew LandlesLead Developer
Thibault BartheletData engineer