Application

Only hackers who have received email acceptance can participate in the hackathon.

Hacking Rules

Pre-existing projects allowed

Our policy on existing projects is that a team may bring in an existing project provided that:

<aside> ⚠️ If these conditions are not met the team will be categorically excluded from the hackathon and will not be eligible for the hackathon prizes or sponsor bounties.

</aside>

<aside> 🚫 Hackathon organizers, mentors, judges, and those involved will take extreme care to avoid fraudulent behavior by exploiting work already done that does not respect other hackers and the previously quoted rules.

</aside>

Prizes and Bounties

There are two tracks proposed:

Both of them follow the same submission and judging process. Among all the projects, 6 in total will be selected as finalists and will be able to do a live demo on stage during the Closing ceremony on Sunday afternoon. Judges preserve a 7-day period to make the results of the two hackathon tracks official. If irregularities are found in the code repositories of any of the 6 winning teams (three for each track), the judges may exclude the team from the hackathon competition and not award the prize.