Hacker Anthology is what happens when you inject fiction into the command line of reality. Faction stories — part fact, part fiction — spun from real-world headlines, startup chaos, cyber leaks, and tech drama. Imagine HackerNews got drunk with Black Mirror, and they started roleplaying historical fiction. That’s us. We take raw internet lore — a GitHub repo flame war, a VC meltdown, an obscure RFC gone rogue — and remix it into cinematic short stories told from the POV of AI misfits, termin ...
…
continue reading
Hacker Stories Podcasts
CNBC's longest-running primetime original series, "American Greed" takes you inside the amazing real-life stories of how some people will do anything for money. The award-winning series is narrated by legendary actor Stacy Keach.
…
continue reading
The Country Life team take you all over the motu to hear the extraordinary stories of every day rural New Zealand.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
The Peabody Award-winning On the Media podcast is your guide to examining how the media sausage is made. Hosts Brooke Gladstone and Micah Loewinger examine threats to free speech and government transparency, cast a skeptical eye on media coverage of the week’s big stories and unravel hidden political narratives in everything we read, watch and hear.
…
continue reading
Introducing Motherlode, a Ranieri & Co. production. The gripping story about the birth of computer hacking from an unlikely centre - Melbourne Australia. It was here teenage boys, and they were mostly boys, hacked into some of the biggest organisations in the world. It’s also where a young hacker, Julian Assange, cut his teeth on computers and went on to develop Wikileaks, the most disruptive website the world has seen. But Wikileaks didn’t just spring up out of nowhere. It was 20 years in t ...
…
continue reading
Join Richie Firth and Chris Skinner as they dive headfirst into the art of decision-making—whether it’s rating the latest TV shows, dissecting bizarre life choices, or tackling the dilemmas their listeners throw their way. No topic is too big, too small, or too ridiculous. Armed with personal experiences, the news of the week, and an inbox full of questionable queries, Richie and Chris promise to leave you ever-so-slightly wiser… or at least Mildly Informed Help the show to continue to rewri ...
…
continue reading
Built This Week is a weekly podcast where real builders share what they're shipping, the AI tools they're trying, and the tech news that actually matters. Hosted by Sam and Jordan from Ryz Labs, the show offers a raw, inside look at building products in the AI era—no fluff, no performative hype, just honest takes and practical insights from the front lines.
…
continue reading
Learn the latest tech-stories updates in the tech world.
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Welcome to The TASTYCAST, our weekly podcast where we react to the latest news and talk about random topics in gaming.
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
Expert On Tap is a smart, laid-back tech podcast where founders, developers, and startup minds share real stories over a cold drink. Hosted by Sean Hussey, each episode blends tech insight, startup lessons, and honest conversation—served with craft beer, cocktails, or whatever’s on tap. Whether you’re building your first SaaS, scaling a team, or just love a good product story, this show is your casual corner of the tech world.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Information you will not read about in the press... by @adanielhill 1st hacker that served time in prision in #uruguay for a computer crime. https://my.darkweb.today/mydarkweb/
…
continue reading
Listen to the Eh Sayers podcast to meet the people behind the data and explore the stories behind the numbers. Join us as we meet with experts from Statistics Canada and from across the nation to ask and answer the questions that matter to Canadians.
…
continue reading
Host Gabriel Aldaz sits down with other bicycle touring and bikepacking enthusiasts to have unexpected, revealing, and often humorous conversations about their most memorable bike touring adventures. You’ll hear individuals, friends, partners, and families from all walks of life share the joys (and sometimes challenges) of bicycle touring. A willingness to explore the unknown, overcoming self-doubt, resilience, and experiencing acts of kindness from complete strangers are recurring themes. G ...
…
continue reading
…
continue reading
A place where Human and Online collide... The Human Hackers podcast is all about you. It's about exploring the trials and tribulations of you as an entrepreneur, seeking success in a world of rapid change and competing interests. It is also raw and real. Phil and Ian relentlessly pursue solutions and ideas to overcome the most common Human and Online challenges. Letting it all go, they unleash their own vulnerabilities and challenges. As the Human Hackers podcast unfolds it's easy to get los ...
…
continue reading
If your dog has cancer, this podcast can help. Vetted advice from real veterinarians who answer your questions. Call our listener line to ask your question: 808-868-3200.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
This series takes you, year by year, into the future, from 2040 through 2195. If you like emerging tech, eco-tech, futurism, perma-culture, apocalyptic survival scenarios, and disruptive science, sit back and enjoy short stories that showcase my research into how the future may play out.
…
continue reading
SCARY STORIES TO REAL LIFE EVENTS CHECK US OUT.
…
continue reading
Learn the latest management updates in the tech world.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Take a Golf Magazine Top 100 teacher, Jeff Smith ( (http://jeffsmithgolfinstruction.com) and pair him with an outstanding radio personality and you have the formula for one helluva Golf Talk Radio Show. John Ashton (the show host) has enjoyed success as a morning personality on radio stations from Bangor, Maine to Dallas, Texas. He’s also embarrassed himself on many golf courses in the same locations. John is a hacker, struggling to break 80 (OK, 90) but has a passion and enjoyment of the ga ...
…
continue reading
Follow along with Louis and Mojca as we grow our profitable businesses. We give weekly updates on the stuff that's on our minds and the challenges we're facing.
…
continue reading
Brenda Neckvatal is a best-selling author, HR Strategist, and culture hacker. Her mission is to pour into her listeners giving them the tan outrageous success. She brings in incredible guests and talks about winning, leadership, influence, some current HR topics, news, and trends impacting businesses of all sizes.
…
continue reading
What if the stories we tell ourselves could change the way we live? Story Better is a storytelling podcast that dives deep into the art and science of the internal narrative—the story you believe about yourself and the world. Drawing on insights from marketing, scriptwriting, and psychology, each episode unpacks the frameworks behind powerful storytelling to help you rewrite the script of your life. Whether you’re a storyteller seeking inspiration or someone ready to transform your personal ...
…
continue reading
Hosted by celebrity esthetician & industry expert Lori Crete, each Beauty Biz Show episode is designed to help you tap into your best success and leave you feeling inspired to build the beauty biz of your dreams! Featuring industry icons and gurus, revenue-driving tips and motivational messages, Lori and her guests inspire you to burst through stagnant industry norms to flourish in your profession and make a beautiful, abundant living doing what you love. A finalist for American Spa Magazine ...
…
continue reading
Hello Guys!! This is my slog. People who like to listen but not read are the main motive here. I want them to also stay up-to-date too without reading but listening!! Subscribe! Access my podcast from Breaker, Spotify, RadioPublic, Pocket Casts & Google Podcasts.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
On Story of the Week, “journalist” Joel Stein chooses an article that fascinates him, convinces the writer to tell him about it, and then interrupts a good conversation by talking about himself. Sometimes the story will be the one everyone is talking about, like the New Yorker article on smoking hallucinogenic toads. Other times we’ll find a story you might have missed, like the one in the Verge about the rock groupie turned hacker who had huge corporations at her mercy. These are stories yo ...
…
continue reading
One Funnel Away: Stories is a show hosted by One Funnel Away Manager, Shane Larson, highlighting One Funnel Away Challengers who took action while in the Challenge and implemented the teachings, and saw success!! Some earned their 1-Comma Club Awards (generating $1,000 in their sales funnel), and built the momentum that helped change their lives and their businesses. Make sure you join the next One Funnel Away Challenge at: https://onefunnelaway.com
…
continue reading
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
…
continue reading
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
…
continue reading
‘Beauty and the Brand,’ is the ultimate podcast for beauty, health, and wellness entrepreneurs! Hosted by Aggie Burnett, a seasoned beauty industry expert, former Glamour Beauty Editor, and founder of a successful indie fragrance brand, this podcast is your go-to resource for launching, growing, and scaling legacy brands that stand the test of time. Join Aggie as she shares her wealth of knowledge from over 15 years in the industry, offering actionable strategies and deep dives into the late ...
…
continue reading
Overcoming impostor syndrome - Practical tips for combating feelings of not belonging in the cyber workplace provided by distinguished guests within the cyber security field
…
continue reading
Broadcasting through the week with a rotating panel of guests, Cyrus Says is the definitive show on life in urban India, politics, sports, civic sense, traffic, kids, food, and everything that matters. Mostly.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
A behind-the-scenes look at what it's like to be an AT&T employee.
…
continue reading
The Twenty Minute VC (20VC) interviews the world's greatest venture capitalists with prior guests including Sequoia's Doug Leone and Benchmark's Bill Gurley. Once per week, 20VC Host, Harry Stebbings is also joined by one of the great founders of our time with prior founder episodes from Spotify's Daniel Ek, Linkedin's Reid Hoffman, and Snowflake's Frank Slootman. If you would like to see more of The Twenty Minute VC (20VC), head to www.20vc.com for more information on the podcast, show note ...
…
continue reading
The goodbye and look back on the camp. The thank you, the funny stories. All of them.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://program.why2025.org/why2025/talk/VSKJMH/By Boekenwuurm
…
continue reading

1
Rush hour rodeo and traffic cam selfies (WHY2025)
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58After some internal evaluation and a journalists inquiry on the possibility of chinese state actors having access to camera footage, Muncipality the Hague decided to do a security test focused on an APT threat on their traffic camera infrastructure. During the session we will show how the team approached this project, how some of the cinematic scen…
…
continue reading

1
Abacus: Open source software for the Dutch Elections (WHY2025)
48:24
48:24
Play later
Play later
Lists
Like
Liked
48:24The Dutch Electoral Council builds its new software-to-be, with a small in-house team, open source and in public. We call her Abacus. In this talk we'll go in depth on the technical and management side of our project. We invite you to join and check out our work! Our talk contains actual code written in Rust."The software used in elections is devel…
…
continue reading
A shared understanding of what time it is and the rate at which time progresses is essential in many areas of technology from industrial control to broadcast. There are two main ways of synchronizing time between multiple computers, Network Time Protocol (NTP) and Precision Time Protocol (PTP). NTP is sufficient for certificate validation, but when…
…
continue reading
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
…
continue reading

1
Scaling up victim notification, because crededential theft is scaling up too... (WHY2025)
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29How do you scale up victim notifications from a couple of hundreds, to thousands, to millions to billions of stolen credentials?Credential theft is on the rise. Cybercriminals are gettings smarter and more efficient. Why hack in, if you can log in?At the DIVD we see this trend in the cases where we assist with notifying victims of credential theft.…
…
continue reading

1
Building Inclusive Quantum Communities (WHY2025)
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27We in Quantum Development (WIQD) is a growing community dedicated to promoting diversity, equity, and inclusion (DEI) in the quantum ecosystem. In this presentation, we will introduce WIQD’s mission and activities, share insights from our first Women’s Day Hackathon, and highlight why fostering an inclusive quantum community is essential for innova…
…
continue reading

1
The $5 Million Question: How to Create Beauty Products That Set the Standard with Holly Moore
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19In this episode of Beauty and the Brand, award-winning product developer and founder of The Ingredientist, Holly Moore, shares what she would create if handed $5 million to launch her dream beauty brand. Known for her “ingredient nerd” roots and a career shaping some of the industry’s most innovative launches, Holly reveals how she’d blend science-…
…
continue reading

1
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28On National Social Engineering Day, we’re pulling the lid off one of the most dangerous insider threat campaigns in the world — North Korea’s fake remote IT worker program. Using AI-generated résumés, real-time deepfake interviews, and U.S.-based “laptop farms,” DPRK operatives are gaining legitimate employment inside U.S. companies — funding nucle…
…
continue reading
Are you interested in maps? Are you searching for a FLOSS mapping navigation? Do you need geodata? Do you need a map on your site? Do you want to help creating maps from your local environment or from vulnerable places? Then, you have come to the right talk! This talks gives a broad overview of OpenStreetMap, the community and how to get started wi…
…
continue reading
Experiences from a hacker working at the Election Council of The Netherlands.After critically following the elections for 8 years from the outside, a hacker was employed as one of the functional administrators of the software supporting the elections. Sharing experiences of the use of election software during 7 elections (2020-2023), from local, na…
…
continue reading

1
Time Lord's adventures: abusing time on Linux systems (WHY2025)
22:49
22:49
Play later
Play later
Lists
Like
Liked
22:49What happens when an attacker controls time on a Linux system? This talk looks at how system clocks work, and what breaks when they’re manipulated. From bypassing delays to triggering subtle logic errors, we’ll explore how unstable time can subvert assumptions, break security controls, and cause software to behave in unexpected or unsafe ways.This …
…
continue reading

1
Canadians Just Aren't California Dreamin' These Days
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57Calllllll-i-forrrrr-nia... here we come? If you've changed your plans to visit the US recently, you're not alone. Nowadays, Canadians are more likely to be singing along to "Bobcaygeon" than "Sweet Home Alabama." Today, we're sitting down with Jane Lin, of the Tourism Statistics Program at Statistics Canada, to dig into StatCan's tourism data and t…
…
continue reading

1
The Well Is Poisoned — Now What Shall We Drink? (WHY2025)
48:02
48:02
Play later
Play later
Lists
Like
Liked
48:02Wikipedia tells us that _low-background steel_ is steel produced before the detonation of the first nuclear bombs. Yep, you guessed it, **this is a talk about Large Language Models**. LLM outputs have quickly spread like radionuclides, threatening everything from the scientific record to the existence of the Internet as we know it. In this talk I'l…
…
continue reading

1
Towards digital sovereignty with cloud federation: how to break the dominance of the hyperscalers (WHY2025)
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52A team of Dutch scientist and cloud engineers is working on Ecofed: European Cloud Services in an Open Federated Ecosystem. The objective and scope of the ECOFED project are to develop a technical framework for a more open and integrated cloud usage model. This framework will enable multiple clouds from various providers to function as a single, co…
…
continue reading

1
Hacked in translation: Giving an Abandoned IoT Device a New Life (WHY2025)
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09As everybody knows, "L" in IoT stands for long-term support.I'll take you on a tour of my technical adventure where I revived an abandoned IoT "AI" translator and gave it a new life, 2025-style. Through deciphering peculiar protocols and formats, reverse engineering firmware and software and doing the necessary research to write new software, we'll…
…
continue reading
Lightning talks are a 5 to 10 minute quick talk on an interesting subject. They can be with or without slides, and with or without proper preparation. if you weren't accepted in the main CfP, this is also a great opportunity to give an abridged version of your talk. These sessions will be available to sign up to later on, with details on the wiki: …
…
continue reading

1
Episode 212: How to Talk to a Cybercriminal
42:39
42:39
Play later
Play later
Lists
Like
Liked
42:39Kurtis Minder knows the dark web better than most—and he’s not just watching from the sidelines. As a ransomware negotiator, he’s helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more abou…
…
continue reading
When a prominent family in a small Oklahoma town is found murdered, their son is the only suspect. Troubled trust fund kid Alan Hruby starts his white collar crimes early. But when the money runs out, is he willing to go even further to satisfy his hunger for cash? (Original television broadcast: 4/9/2018) Want to binge watch your Greed? Full episo…
…
continue reading

1
From Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli ...
27:02
27:02
Play later
Play later
Lists
Like
Liked
27:02When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security. V…
…
continue reading

1
Simplifying Security Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25At Black Hat USA 2025, Danny Jenkins, CEO of ThreatLocker, shares how his team is proving that effective cybersecurity doesn’t have to be overly complex. The conversation centers on a straightforward yet powerful principle: security should be simple enough to implement quickly and consistently, while still addressing the evolving needs of diverse o…
…
continue reading

1
A journey into reverse engineering arcade PCBs for video game preservation via FPGA emulation (WHY2025)
48:10
48:10
Play later
Play later
Lists
Like
Liked
48:10Sometimes ago, I embarked on a journey into the world of electronics and FPGA technology with no prior knowledge. What began as passion for retro gaming evolved into a quest for preservation via reverse engineering and FPGA-based emulation. This presentation will share my journey, highlighting the challenges of learning Verilog, the tools, the reso…
…
continue reading

1
Flipping Bits: Your Credentials Are Certainly Mine (WHY2025)
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52Did you know that if you change a single bit from 1 to 0 (or vice versa) in the first 'g' of the domain name google.com (which is 01100111 in binary) you will end up with variety of valid "bitflip" domains like coogle.com, oogle.com, & woogle.comSo what happens if you generate and register a bunch of cheap bitfliped versions of popular cloud / Saas…
…
continue reading

1
❤️ Failure - Unbreakable security by breaking things (WHY2025)
47:52
47:52
Play later
Play later
Lists
Like
Liked
47:52Security teams want to prevent incidents - but what if controlled breaking prevents catastrophic failures? Drawing from aviation safety, chaos engineering, and resilience design, discover why 'unbreakable' security comes from breaking things on purpose. Learn to transform incident culture from blame to learning, implement controlled failure practic…
…
continue reading

1
From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38In today’s connected world, corporate executives and board members live in a digital space that extends far beyond their company’s networks. Chris Pierson, CEO and Founder of BlackCloak, explains how protecting leaders requires more than traditional enterprise security—it calls for securing their personal digital lives. The threat landscape for hig…
…
continue reading

1
Four Freedoms of Social Media Protocols (WHY2025)
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03Our digital communities are controlled by corporate platforms that surveil, manipulate, and arbitrarily deplatform us. We need a Bill of Digital Rights—ensuring privacy, ownership, algorithmic control, and self-governance. This talk lays out the Four Freedoms for Social Media and how open protocols like ATProtocol, ActivityPub, and Nostr make them …
…
continue reading
TIC-80 fantasy console Byte Jam is a friendly competition to livecode a demo in a relaxed atmosphere.TIC-80 fantasy console Byte Jam is a friendly competition to livecode a demo in a relaxed atmosphere. This can take an hour or more depending on the inspiration and time needed of the participants. You could follow the suggested random chosen topic …
…
continue reading

1
Retrospective: Adventures with CircuitPython (WHY2025)
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52I used CircuitPython (but could have also used MicroPython as well, so this is not about A vs. B) to implement various smart-home related projects. I will present some of my projects and also dive into what Python has to offer for (personal, not corporate-style) embedded devices (and the development process).1) Introduction - My (past) smart-home s…
…
continue reading
The Light and Music entertainment platform Lightupyourbanjo began in 2010 when “Cash-a-billy with a Bluegrass bite” band Ed and the Fretmen wanted to have better lights on their banjo. They developed banjo lights with addressable LEDs for in and outside mounting showing interactive animations, written in C++ supporting the songs, and wrote songs to…
…
continue reading

1
Getting Started: Reading Bosch Sensor Data on the Badge with MicroPython (WHY2025)
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37This talk introduces participants to the Bosch BMI270 (inertial sensor) and BME690 (environmental sensor) on the WHY2025 Hackathon Badge. After a brief overview of MEMS technology and how these tiny sensors are made and used, we’ll dive into a hands-on session showing how to read sensor data using MicroPython — so you can start experimenting right …
…
continue reading

1
Automate yourself out of supply chain hell (WHY2025)
49:42
49:42
Play later
Play later
Lists
Like
Liked
49:42Modern software development and operations heavily relies on third-party applications, libraries, containers etc. This presentation will showcase how dev, ops, but also security management can be transparent about dependency versioning and known vulnerabilities, while also staying on track with updates.It will show demos of Open Source Standards li…
…
continue reading

1
Using deployment diagrams to explain architecture and security to everybody (WHY2025)
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34This talk will enable you to lead architecture conversations and discuss their security options through an informal diagramming technique. I will use examples such as key/encryption architectures, DevOps, and even your home music system.Presentation at https://digitalinfrastructures.nl/why2025/You have seen many diagrams of computer and information…
…
continue reading

1
Offworld Voyage: Can Training for Mars Exploration Also Address Human Adaptation to Climate Bio-devastation on Earth? (WHY2025)
46:53
46:53
Play later
Play later
Lists
Like
Liked
46:53This talk will present the design philosophy behind Offworld Voyage, a decentralized science initiative that develops ecologically sustainable training habitats for use in simulated Mars surface exploration missions - while also solving for adaptation to extreme climate change on Earth.The Offworld Voyage M.A.R.S. Tesseract Space Analog Simulation …
…
continue reading

1
Nerding out over silly machines (WHY2025)
43:25
43:25
Play later
Play later
Lists
Like
Liked
43:25You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
…
continue reading

1
Building Bitchat: Offline first protocols and E2E Encrypted Social Apps with Nostr, Noise, and MLS (WHY2025)
43:47
43:47
Play later
Play later
Lists
Like
Liked
43:47Learn how to build end-to-end encrypted social apps including the newly released Bitchat using Nostr and MLS (Messaging Layer Security). We'll go from Nostr basics through to encrypted groups, explore the open source libraries and apps already in production, and show how to build your own. Includes live coding demonstrating how to create secure, pr…
…
continue reading

1
Die Hardcoded: Unlocking Yealink's (weakest) secrets (WHY2025)
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10During this talk we look at hardware and firmware reverse engineering, but also at corporate intimidation tactics and how to respond ethically as a security researcher.Leveraging the hard-coded AES keys, outdated software, and lots and lots of custom code we found, we were able to install "custom code" on some phones and access global customer conf…
…
continue reading

1
Caveat Emptor: Ratings and Reviews Can't Be Trusted (WHY2025)
50:02
50:02
Play later
Play later
Lists
Like
Liked
50:02It's hard for a platform to have meaningful, useful ratings/reviews without both substantially Knowing Your Customer, engineering to detect manipulated reviews,and responding in a nuanced way -- to increase a fraudster's costs, and not just train them to hide better. Lots of examples of diverseplatforms not doing a very good job of this. (I'll also…
…
continue reading

1
How we stopped a € 50 million project from destroying a forest (and other ways to pick fights with corporations and governments) (WHY2025)
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31In 2017 a large corporation announced that they wanted to build a € 50 million theme park in a small forest that I had known from my childhood, thus replacing the future of our children with simple entertainment. An overwhelming feeling of injustice came over us. We created a plan, and we stuck to it. We drew a line in the sand.Fatalism can be your…
…
continue reading

1
The story and maths behind the Sferical lamps (WHY2025)
23:13
23:13
Play later
Play later
Lists
Like
Liked
23:13My experience of contributing to an open-source project for the first time and the juicy details (maths) of the geometry of the Sferical lamps (the ones that hang in Heaven / Silent Lounge)I'd like to take you with me on how I build a generator for spherical lampshades. I'll talk about how math slowly turns into magic. The math is mainly trigonomet…
…
continue reading

1
When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine’s Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk. AI is driving a seismic transformation in business operations, with executive teams rapidly deplo…
…
continue reading
live-bootstrap is a worthy attempt to provide a reproducible, automatic, complete end-to-end bootstrap from a minimal number of binary seeds to a supported fully functioning operating system. Although it is starts with a minimal binary seed of only 280 bytes it also depends on a lot of other sources. What are those sources exactly and how can we re…
…
continue reading

1
Guardians of the Dutch healthcare part 2: NIS2 edition (WHY2025)
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44In 2017 (just before SHA2017) the Dutch healthcare sector came together to create Stichting Z-CERT, the Zorg Computer Emergency Response Team. A nonprofit to protect and advise the Dutch Healthcare sector. What started as a small startup has now grown into a scaleup with the ambitions to match.A lot has changed in the 3 years since the last talk ab…
…
continue reading

1
A Journey Through Boring Telco Data Leaks (WHY2025)
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10Over the past few years, I’ve been casually poking around and stumbling upon exposed data and insecure infrastructure all across the telco ecosystem. From unsecured debug portals to full backend access, the leaks themselves might seem technically boring.In this talk, I’ll walk through a handful of real-world cases, showing how misconfigurations, sl…
…
continue reading

1
From barking to Meow: mature pentesting (WHY2025)
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57In a world of relentless cyber-threats, MIAUW (Methodology for Information Security Assessment with Audit Value) turns every pentest into a high-impact, traceable mission. This session reveals how its storyline-driven playbook fuses technical exploitation, legal rigor and forensic reporting into a reusable blueprint that regulators love and attacke…
…
continue reading
Adversary-in-the-Middle (AiTM) phishing kits have matured into full-service SaaS platforms. This talk dives into the infrastructure, control panels, and sellers behind modern AiTM attacks. From Dockerized environments to Telegram bot-based UIs, we unpack how these platforms operate, scale, and monetize. We also highlight how this SaaS model is spre…
…
continue reading

1
🛡️ Linux Permissions and Hardening (WHY2025)
25:07
25:07
Play later
Play later
Lists
Like
Liked
25:07You want to learn more about Linux permissions? This is the talk for you. Let's learn about the basic UID/GID concepts in Linux and expand into more complex ACLs. Then escalating on the "everything-is-a-file" concept and applying the learned security logic onto program behavior using SELinux or AppArmor.The first point a "normal" user encounters Li…
…
continue reading

1
WHY and how would somebody cycle over 500km to a hacker conference? (WHY2025)
46:29
46:29
Play later
Play later
Lists
Like
Liked
46:29I (hopefully) will have cycled from my home city of Mannheim all the way to the WHY camping grounds (>500km) in one go.I will report how I approached the whole endeavour, how I prepared, what the challenges were and what the hard part was.If I happen to not make it, I will describe how, why and what I should have done better.Planing and executing a…
…
continue reading
Placeholder for WHY2025 Infrastructure Review... various *OC teams will present about the infrastructure they have built for WHY2025.At least Team:NOC will join; previously also Team:Nuts (Power), Team:POC and Team:VOC have joined.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://program.why2025.org/…
…
continue reading

1
Reverse Engineering Life: Afterparty (WHY2025)
50:04
50:04
Play later
Play later
Lists
Like
Liked
50:04Afterparty for "Reverse Engineering Life: A teardown of the DNA source code of a whole bacterium". Q&A and some bonus content.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://program.why2025.org/why2025/talk/A8LMHV/By bert hubert
…
continue reading

1
Containing the Horror — A Critique on Docker & Co (WHY2025)
45:58
45:58
Play later
Play later
Lists
Like
Liked
45:58For a good decade now, containerisation has been a popular solution: Addressing issues such as security, fault tolerance, and scalability, it has turned into a mainstay in IT. Though with a technology that ubiquitous, it does deserve investigation whether it has been put to good use or rather pressed into service.This talk includes a brief history …
…
continue reading