Skip to main content
SHOW DETAILS
eye
Title
Date Archived
Creator
Hacker Conferences
movies

eye 39

favorite 0

comment 0

Alexandra Ellerbeck, Camille Fassett Last August, a coalition of more than two dozen organizations dedicated to press freedom came together to launch the U.S. Press Freedom Tracker, a website that systematically documents press freedom violations in the United States. When the tracker was launched, it was never anticipated that more than 100 cases would be logged in the first year. These cases show that Trump’s heated rhetoric in D.C. is far from the only press freedom story. It still remains...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 16

favorite 0

comment 0

Karen M. Sandler, Molly de Blanc If you are coding, writing, or making art or any other creative works, at some point you need to pick a license for how you want to share what you’ve done. A license represents a series of ethical, legal, and values decisions. Instead of proprietary "software" and "culture," you have "free software" and "free culture." The licenses used to accomplish this are the legal embodiment of a set of ideals represented in the...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 13

favorite 0

comment 0

nmlstyl joey, a.k.a nmlstyl (pronounced "animal style"), is a philadelphia based visual artist, coder and hacker musician who is known for pioneering the squarewave synth guitar sound. http://nmlstyl.com vaporstack vaporstack is a classically trained, brooklyn based artist and developer with a focus on procedurally generated realtime graphics. weapons of choice: 68k macs, robotics, watercolor, graphite. http://vaporstack.org/ Source:...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 17

favorite 0

comment 0

Roel Schouwenberg The NotPetya "ransomware" made the headlines last summer because it spread widely and hit major logistics supply chain companies. It caused $10 billion in overall damages. This presentation will dissect the technical, disinformation, and influence operation components of this extremely effective and misunderstood campaign. http://bit.ly/2n7xAGo Source: https://livestream.com/internetsociety3/hope/videos/178448536 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 22

favorite 0

comment 0

Nathan Proctor, Gay Gordon-Byrne, Kyle Wiens It’s time we restored ownership rights in a digital world, and that begins with letting us fix our electronics. As companies work to monopolize repair, use copyright law to block access to what we need to fix things, and design products that cannot be repaired, leaders from Right to Repair will share stories on how people are pushing back. They will give a presentation on the current state of Right to Repair legislation across the country and...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 28

favorite 0

comment 0

None Source: https://livestream.com/internetsociety3/hope/videos/178016997 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
movies

eye 41

favorite 0

comment 0

Keith Monahan Growing up on the Commodore Amiga introduced Keith to the venerable Motorola 68000 processor. This talk will share the technical details of how he integrated an open-source 68K soft-core processor on a $30 FPGA board: what challenges he faced, skills he needed to learn, and how he managed to create his own retrocomputer - complete with 7" touchscreen and old-school audio - from scratch. This talk will touch on topics like computer architecture and design, Verilog HDL, 68K...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 24

favorite 0

comment 0

Nathalie Maréchal Networked authoritarianism is a political system that leverages information and communications technologies (ICTs) and media regulation to carefully control the expression of dissent in a way that gives the impression of limited freedom of expression without allowing dissent to gain traction. Networked authoritarianism combines strategies and tactics from the surveillance capitalism of Silicon Valley and from the information controls practiced by illiberal regimes around the...
Topics: Livestream, video
Hacker Conferences
movies

eye 70

favorite 0

comment 0

Kit Stubbs In this session, Kit presents "I’m A Queer, Non-Binary, Disabled Trans Femme Originally From Missouri Who Makes Their Own Geeky Sex Toys And Runs A Sex-Positive Nonprofit: Ask Me Anything." https://www.hope.net/schedule.html#-the-sex-geek-returns-hacking-plus-human-sexuality-ama- Source: https://livestream.com/internetsociety2/hope/videos/178433692 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
movies

eye 30

favorite 0

comment 0

Laura Reed Laura will provide highlights from the recently launched Ranking Digital Rights 2018 index, showing where companies are beginning to be more transparent about their practices - things like content moderation policies and practices for handling user information - and where there are still significant gaps in disclosure that leave users in the dark. https://www.hope.net/schedule.html#-free-expression-privacy-and-the-role-of-tech-companies-where-do-we-go-from-here- Source:...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 37

favorite 0

comment 0

Brian L. Stuart The ENIAC was dedicated on February 15, 1946 and became the testbed upon which people learned to build and program powerful digital computers.This presentation will focus on how the ENIAC was conceived, designed, built, and worked; how it was used in different modes of operation; and the details of its internal operations. This will be illustrated in real-time with a fully functional, interactive, and photorealistic ENIAC emulator created by the speaker. http://bit.ly/2O1qbUu...
Topics: Livestream, video
Hacker Conferences
movies

eye 32

favorite 0

comment 0

simplymathematics In the last decade, we’ve learned a lot about the ways in which state surveillance is conducted - the state has likewise hardened their approach. This talk will examine solutions to this mass surveillance in the context of community-controlled infrastructure. In particular, the roles that encrypted messaging, distributed file systems, and mesh networking play in fighting back against the ever encroaching Skynet will be examined....
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 27

favorite 0

comment 0

Johannes Grenzfurthner Back in the good old days of 2015, Shami Chakrabarti wrote an opinion piece for The Guardian, stating that Edward Snowden "is a hero." She claimed that saying so didn’t make her an apologist for terror; it made her a firm believer in democracy and the rule of law. Many saw and still see it this way. Snowden, the true protector of freedom! It’s heard frequently in hacker circles, echoing like a prayer in a church. He’s a freedom fighter, standing for the...
Topics: Livestream, video
Hacker Conferences
movies

eye 17

favorite 0

comment 0

Michael "Sveder" Sverdlin Michael will go through the story of his smart water heater and how he’s slowly but surely making it more hacker friendly - from replacing its permission hungry app, to inspecting the software and the remote API it insecurely communicates with, and finally physically taking it apart in order to make sure it doesn’t have added "features." The talk will include technical details about his device, but more importantly it will contain strategies and...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 31

favorite 0

comment 0

Luca Follis In this talk, the argument is presented that state hacking is bad for democratic elections, the integrity of the security services, transparency in government, privacy for the individual, the separation of public and private militaries, the judicial system, and the development of ethical cybersecurity practices. Such hacking is a short circuit in the rule of law and undermines the machinery of democracy. State hacking is bad because it provides unparalleled advantage to rulemakers...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 18

favorite 0

comment 0

Brianne Hughes English is a messy language, and no amount of spellcheck can stop you from writing about "security breeches" or "rouge towers." Come witness your peers bravely seek the redemption they’ve hoped for since elementary school as they battle through increasingly difficult security terms for fun and a moderate prize. The bee will warm up with "asset" and "bypass" and work its way up to rounds where capitalization will count and determine the...
Topics: Livestream, video
Hacker Conferences
movies

eye 14

favorite 0

comment 0

Matt Griffin While the world was falling in love with desktop 3D printers as a potential disruption to how consumer products might be created and manufactured (in the home), a parallel transformation was taking place that shows no sign of stopping. It is time to cut through the bullshit and examine the revolution that actually took place! Experience case studies and research that speaks practically to how manufacturing, medicine, design, and enterprise use of the technology is accelerating the...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 12

favorite 0

comment 0

Business Pastel Business Pastel is the solo project of Billy Murphy from Long Island, NY. Billy pulls from numerous styles of music, to better capture the complex feelings that come with growing up. http://soundcloud.com/businesspastel Enerjawn Equipped with long forgotten equipment from years past, Enerjawn focuses on painting live visuals with the use of optical feedback and light. https://www.facebook.com/Enerjawn/ Source: https://livestream.com/internetsociety3/hope/videos/178446848...
Topics: Livestream, video
Hacker Conferences
by Shawn Achor
movies

eye 441

favorite 0

comment 0

We believe we should work hard in order to be happy, but could we be thinking about things backwards? In this fast-moving and very funny talk, psychologist Shawn Achor argues that, actually, happiness inspires us to be more productive. Source: https://www.ted.com/talks/shawn_achor_the_happy_secret_to_better_work Uploader: Shawn Achor
Topics: TED, video, TEDx, business, happiness, psychology, science, brain, mind, cognitive science,...
Mark Milhouse (amne51ac) Mark will demonstrate how, using the built-in features of advertising demand-side platforms (DSPs), it’s easy to build a surveillance system that can track unsuspecting people. He’ll demonstrate that some platforms make it much easier than it needs to be, and show that there’s more than just geolocations at risk here. Finally, Mark will discuss some ways that everyone can help mitigate this....
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 13

favorite 0

comment 0

xoadc xoadc conjurs the ghosts of radio towers with theremin antennae. In Requiem for Radio: Pulse Decay, she summons images and contact mic recordings of the recently demolished Radio Canada International shortwave towers themselves. xoadc is a solo project by Montreal based artist, Amanda Dawn Christie. http://www.amandadawnchristie.ca/requiem-for-radio/ Source: https://livestream.com/internetsociety3/hope/videos/178446210 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 19

favorite 0

comment 0

Anna Bernardi, Filippo Valsorda Antonio Marzi died in 2007, leaving behind dozens of encrypted notes and a partial key. During World War II, he chose to work with the British Special Operations Executive and was parachuted into Italian territory under German occupation. There he transmitted detailed military-related dispatches in encrypted form. .During the war, entire departments hacked away at these ciphertexts, but today computers make easy work of them. This talk will explore how they went...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 22

favorite 0

comment 0

None Source: https://livestream.com/internetsociety2/hope/videos/177927326 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 13

favorite 0

comment 0

Daniel Nazer EFF has a "Stupid Patent of the Month" blog series, which highlights some of the silliest patents and the most destructive patent troll campaigns. It has also gotten EFF sued - twice. People don’t like it when you say that their stupid patents are stupid. Fortunately, both times EFF fought back and won. But how is the policy battle going? Did the Supreme Court get rid of software patents in a 2014 decision? Is the USPTO still churning out terrible patents? Will Congress...
Topics: Livestream, video
Hacker Conferences
movies

eye 78

favorite 0

comment 0

Thomas Witherspoon low-cost software-defined radios (SDRs) coupled with today’s faster memory-enhanced computers allow us to record not just individual signals from one radio station at a time, but an entire broadcast band - a wide swath of frequencies - all at once. Each recording from a particular day and time can easily contain dozens, if not hundreds, of stations broadcasting and communicating simultaneously. Later, via a software-defined radio application, recordings can be tuned and...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 14

favorite 0

comment 0

Ed Ryan Patent law can’t cover everything. In cases where the publicity of a patent is too high a price to pay, the law provides protections against the "misappropriation" of trade secrets, which have no expiration date. Trade secret law has been strengthened in recent years to include federal protection and warrantless seizure of property. This talk introduces the trade secret and industrial espionage laws and outlines the limitations of these laws in the face of a person intent on...
Topics: Livestream, video
Harley Geiger, Amie Stepanovich The Internet of Things is expected to grow to more than 200 billion devices by 2020. Unfortunately, the market has not incentivized strong security for most IoT products, and the legal and regulatory environments - not surprisingly - have not been able to keep pace with the technology. This talk will detail the potential growth of the Internet of Things, focusing on the exploration of key legal and policy developments related to IoT security. Included will be...
Topics: Livestream, video
Hacker Conferences
movies

eye 26

favorite 0

comment 0

Manny Faces Hip-hop is a world-class disruptor. It has transformed music, popular culture, fashion, business and advertising, creating (and upending) massive industries in its wake. This talk explores the enormous innovative potential that hip-hop music and culture continue to exert across multiple fields and disciplines, including science and technology, education, health and wellness, politics and activism, journalism, the fine arts, and... well... everything....
Topics: Livestream, video
Hacker Conferences
movies

eye 24

favorite 0

comment 0

TProphet TProphet will take you around the world and across the telecommunications landscape to explore the past, present, and - hopefully - future of the phone system. https://www.hope.net/schedule.html#-the-phone-system-is-dead-long-live-the-phone-system- Source: https://livestream.com/internetsociety2/hope/videos/178432971 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
movies

eye 25

favorite 0

comment 0

David Noever As the biggest public domain email database, the Enron email corpus details financial deception in the world’s largest energy trading company and, at the time in 2002, triggered the most costly U.S. bankruptcy and its most massive audit failure. What can Enron tell us today? This talk will invite fresh perspective on how email has (and has not) changed since 2002. Can modern forensic methods find where any new email bodies are buried, even when scanning through the evidence of a...
Topics: Livestream, video
Hacker Conferences
movies

eye 44

favorite 0

comment 0

Bruce Kushnick America was supposed to be a fiber optic nation and the telecom pipes were supposed to be open to all forms of competition. Customers paid over half a trillion dollars to make this happen by 2018 - and that’s the low number. Through mergers and the takeover of the FCC and some state commissions, today there are only a few companies that have taken control of most of America’s broadband, Internet, cable TV, phone, satellite, and wireless services. How do we fix net neutrality,...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 21

favorite 0

comment 0

Karl Anderson Part public service and part public art, Futel is keeping payphones alive by installing them in public locations and providing free telephone service, telephone-mediated art, and live human interaction. They feel that the constraints of the phone interface spur creativity, pay homage to a generation of creative hackers, and allow them to worm their way into the minds of large groups of people. Now that we are finally living in the cyberpunk dystopia promised in the 1980s, they are...
Topics: Livestream, video
Hacker Conferences
movies

eye 26

favorite 0

comment 0

Saint, Hook, Pete Tridish Montana Ethical Hackers (MEH) walks you through the trials and tribulations of developing KMEH 107.9 - End of the Dial Hacker Radio. Their presentation ranges from overcoming low budget logistical challenges and the FCC application process to convincing the U.S. military to give up a call sign. Content generation and copyright issues will be covered. The talk will also include a quick background on the pirate radio movement of the 1990s, and how that spawned the legal...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 22

favorite 0

comment 0

krt_ Armed w/only Game Boys, synths & a Nintendo DS. She doesn't label herself in any genre except for whatever music pops in her head in the middle of her ADHD crisis. https://kurtunderscore.bandcamp.com/ vaporstack vaporstack is a classically trained, brooklyn based artist and developer with a focus on procedurally generated realtime graphics. weapons of choice: 68k macs, robotics, watercolor, graphite. http://vaporstack.org/ Source:...
Topics: Livestream, video
Hacker Conferences
movies

eye 24

favorite 0

comment 0

Nathan Fuller, Grace North, Lauri Love, Barrett Brown Earlier this year, U.K. security researcher Lauri Love successfully beat back the U.S.’s attempt to extradite him from Britain, in a redux of Gary McKinnon’s ten year extradition battle which resulted in the "forum bar" that helped protect Love. But the judges in Lauri’s case went further than protecting only him: The High Court’s ruling condemned the conditions of U.S. prisons, citing dangerously inadequate mental...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 25

favorite 0

comment 0

MC: Jason Scott Source: https://livestream.com/internetsociety3/hope/videos/177966071 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
movies

eye 18

favorite 0

comment 0

Aditya K. Sood IoT botnets are deployed heavily to perform nefarious activities by circumventing the integrity of the IoT device to launch sophisticated targeted or broad-based attacks. IoT botnets have enhanced the cybercrime operations to a great extent, thereby making it easier for the attackers to carry out unauthorized activities on the Internet. In this talk, Aditya will perform an empirical analysis to conduct a characteristic study of IoT botnets to understand the inherent design,...
Topics: Livestream, video
Hacker Conferences
movies

eye 20

favorite 0

comment 0

Jeff Landale, Sean Vitka, Marcy Wheeler, Sue Udry, Alex Marthews After the passage of the USA Freedom Act, former NSA director Michael Hayden was flabbergasted at the lack of restrictions placed on the NSA. "And this is it after two years? Cool!" What happened? The panel will discuss the failures of the post-Snowden surveillance reform movement and examine the divergences and conflicts between think tanks and grassroots organizations on strategy, tactics, and goals that allowed the...
Topics: Livestream, video
Privacy, Anonymity, and Individuality - The Final Battle Begins Steven Rambam speech at HOPE XI
Topics: privacy, paranoia, hopexi, hope
Hacker Conferences
movies

eye 32

favorite 0

comment 0

Mitch Altman This is an inexpensive Arduino-compatible musical instrument with a touch keyboard, amp, and speaker that anyone can make. It is easy to build - designed for total beginners to learn to solder together. https://www.hope.net/schedule.html#-ardutouch-music-synthesizer-kit-music-generation-for-newbies- Source: https://livestream.com/internetsociety2/hope/videos/178394812 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 23

favorite 0

comment 0

Maggie Mayhem In recent years, sex worker rights have been systematically eroded in the name of combating human trafficking, despite a lack of evidence to justify these actions and the fallout they cause. The recent passage of the Stop Enabling Sex Traffickers Act (SESTA) not only continues this dangerous trend, it places human trafficking victims at greater risk and jeopardizes Internet freedom for all by eliminating Section 230 of the Communications Decency Act. With online platforms open to...
Topics: Livestream, video
Hacker Conferences
movies

eye 64

favorite 0

comment 0

The participation of women in computer education is low; undergraduate classrooms in Germany were only 10% female in 2000[1]. The picture at the primary school level is fuzzier, as students do not declare majors at that level, but evidence indicates the trend starts from a young age. Can we make computer education more gender-inclusive? Presenting technology in familiar, non-threatening contexts can lead to more balanced gender participation. For example, Chibitronics uses the context of...
Topics: CCC, video, Hardware & Making, 7975
Hacker Conferences
movies

eye 35

favorite 0

comment 0

(start missing) Michael Laufer Learn how to make medicine from poison, how to use the shrouding of information about medicine to make custom-tailored treatment programs for rare diseases, and how to use public data to find new, more efficient synthesis pathways for drugs. Hack your health. We can torrent medicine. File sharing saves lives. https://www.hope.net/schedule.html#-torrent-more-pharmaceutical-drugs-file-sharing-still-saves-lives- Source:...
Topics: Livestream, video
Hacker Conferences
movies

eye 77

favorite 0

comment 0

Kevin Hodges In William Gibson’s prophetic 1984 book Neuromancer, he described AI that could autonomously wage cyber warfare. Today, we are regularly warned about the security and privacy implications of software that can learn and make decisions from massive datasets, but rarely do we discuss the possibility of this same software being used to make cyber attacks, or the possibility that it could escape our control. Through a series of questionable ethical decisions, the first iteration of...
Topics: Livestream, video
Hacker Conferences
movies

eye 20

favorite 0

comment 0

Dan Bartholomew, Ryan Fukunaga, Zachary (Zac) Slade, Charlie Coile, Joel Izlar https://www.hope.net/schedule.html#-free-geek-panel-reusing-and-recycling-old-computers-for-fun-and-nonprofit- Source: https://livestream.com/internetsociety2/hope/videos/178433640 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 22

favorite 0

comment 0

Glenn Willen What precisely is a blockchain, and why is it useful? Where did it come from, what is it good for, and - more importantly - what is it totally garbage at? And what kinds of bullshit are people trying to use it for that just doesn’t make any goddamned sense? Glenn is here to tell you exactly why your blockchain sucks. https://www.hope.net/schedule.html#-your-blockchain-sucks- Source: https://livestream.com/internetsociety2/hope/videos/178432329 Uploader: tubeup.py
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 18

favorite 0

comment 0

Vitorio Miliano NFC toys are figurines with a built-in near-field communication tag, containing supporting data for games or play. Reading from and writing to these figures is restricted; you can buy the toy, but only special hardware or software can fully use it, not you! This introductory-level case study will explore the NFC tags found in three makes of toys, using off-the-shelf hardware and software. You’ll see how much can be learned with each different tool, and once read/write...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 27

favorite 0

comment 0

Gillian "Gus" Andrews This talk will discuss components of hacking and security - technical expertise, secrecy, illegality, idiosyncrasy, and trust - that contributed to a mystique which until recently hid years of abuse by a number of hacking "rock stars." Gus will explore the psychological and institutional reasons why our communities let them keep acting that way, and ask some hard questions: are there aspects of hacking and infosec which make abusive experts difficult to...
Topics: Livestream, video
Hacker Conferences
movies

eye 20

favorite 0

comment 0

Alex Muentz We’re seeing a lot of changes in privacy law and security regulations in both the European Union and the United States. Some of these are beneficial, while others may make us less safe and free. Alex will discuss the current state of GDPR (the E.U.’s General Data Protection Regulation), recent U.S. SEC guidance on reporting security breaches, as well as the recently passed FOSTA-SESTA. https://www.hope.net/schedule.html#-u-s-and-e-u-legal-updates-privacy-security-and-liability-...
Topics: Livestream, video
Hacker Conferences
movies

eye 26

favorite 0

comment 0

Jonah Bossewitch Surveillance psychiatry is an emerging practice which seeks to predict and prevent mental illness across a broad population by using algorithms and big data.When algorithms are scrutinizing our tweets to determine who is crazy, it will become increasingly difficult to avoid a diagnosis. But there is hope. In this millennium, a new wave of mad resistance has emerged - the Mad Underground, a thriving network of mental health activists who are developing innovative strategies for...
Topics: Livestream, video
Hacker Conferences
by tubeup.py
movies

eye 67

favorite 0

comment 0

In August 2016, Apple issued updates to iOS and macOS that patched three zero-day vulnerabilities that were being exploited in the wild to remotely install persistent malcode on a target’s device if they tapped on a specially crafted link. We linked the vulnerabilities and malcode to US-owned, Israel-based NSO Group, a government-exclusive surveillance vendor described by one of its founders as “a complete ghost”. Source:...
Topics: CCC, video, Ethics, Society & Politics, 8115
Hacker Conferences
movies

eye 32

favorite 0

comment 0

Jairus Khan Mozilla’s Internet Health Report is an open-source project that documents and explains how people worldwide are interacting with and affected by our connected world. The report aims to provide a "big picture" of the global state of health of the Internet through the prism of five core issues: privacy and security, openness, digital inclusion, web literacy, and decentralization. This talk will share findings from the 2018 Internet Health Report, and examine how we might...
Topics: Livestream, video
They stole our future. Let's take it back. Here at the end of the world, it's time to take stock. Is technology a force for good? Can it be? Was it ever? How did we end up with a world made up of "five websites, each filled with screenshots of text from the other four" (h/t Tom Eastman)? Should we worry that machine learning will take away our free will through A/B splitting and Big Five Personality Types? Where the fuck did all these Nazis come from? Source:...
Topics: CCC, video, rc3-mcr, 11337, 2020, Ethics, Society & Politics, main
FOSDEM 2018
by FOSDEM
movies

eye 14

favorite 0

comment 0

by Hartmut Holzgraefe At: FOSDEM 2018 Room: AW1.126 Scheduled start: 2018-02-04 15:30:00+01 Source: https://www.youtube.com/watch?v=MmbBCZna72c Uploader: FOSDEM
Topics: Youtube, video, Science & Technology
FOSDEM 2018
by FOSDEM
movies

eye 19

favorite 0

comment 0

by Dave Lambley At: FOSDEM 2018 Room: K.4.601 Scheduled start: 2018-02-04 15:40:00+01 Source: https://www.youtube.com/watch?v=-MwXoB0CQRU Uploader: FOSDEM
Topics: Youtube, video, Science & Technology
BSides San Francisco 2018
movies

eye 19

favorite 0

comment 0

Poornaprajna Udupi - Starting a Security Program: Thrills and Spills Building a security program sounds exciting and exhilarating. Security practitioners tend to focus on technology and policy skills in preparation for such an opportunity. But, developing good emotional intelligence is critical for this role of a security program builder. Why would the engineering team dedicate cycles to turn on find-sec-bugs, resolve all findings and then be willing to fail the build pipeline on errors? Why...
Topics: Youtube, video, Science & Technology
HOPE XI
movies

eye 19

favorite 0

comment 0

Saturday, July 23, 2016: 11:00 pm (Friedman): Forget about network perimeters - an organization’s real attack surface is made up of which codebases can be interacted with or altered. This talk explores the past history and the methods available for maliciously altering codebases and it even includes how an attacker can bring their code into your organization without even touching your perimeter. Topics covered include everything from conceptualizing an attack path to the execution of it;...
Topics: Youtube, video, Science & Technology, hack, hacking, hacker, hackers, computer, telephone,...
FOSDEM 2019
movies

eye 10

favorite 0

comment 0

by Vadim Markovtsev At: FOSDEM 2019 https://video.fosdem.org/2019/H.2213/ml_on_code_code_review_suggestions.webm Many developers hate doing code reviews. Reading foreign code is hard, and suggesting improvements is even harder. Yet a dramatic portion of code review time goes to figuring out the boring details: formatting, naming, microoptimizations and best practices. We believe that all of those can be automated with ML on Code, either learning from a particular project or from all the open...
Topics: Youtube, video, Science & Technology
34 Chaos Communication Congress
by media.ccc.de
movies

eye 13

favorite 0

comment 0

/redirect?redir_token=a6v7Noj-_jhJJkgzztGXqwpcGtF8MTUxNTc5MzAyMkAxNTE1NzA2NjIy&v=TLcByvUGMvk&q=https%3A%2F%2Fmedia.ccc.de%2Fv%2F34c3-9257-lightning_talks_day_3&event=video_description Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you...
Topics: Youtube, video, Education, tuwat, leipzig, congress, chaos, 2017, CCC, Day 3, Saal Borg, 34c3 ov,...
Security Onion
by Security Onion
movies

eye 28

favorite 0

comment 0

Security Onion Conference 2016 Eric Conrad - @eric_conrad "C2 Phone Home: Leveraging Security Onion to Identify Command and Control Channels" Source: https://www.youtube.com/watch?v=ViR405l-ggg Uploader: Security Onion
Topics: Youtube, video, People & Blogs, Security Onion, Information Security, NSM, Infosec, Snort,...
FOSDEM 2018
movies

eye 22

favorite 0

comment 0

by Johan Thelin At: FOSDEM 2018 Room: UD2.218A Scheduled start: 2018-02-03 13:30:00+01 Source: https://www.youtube.com/watch?v=2PpD1UTX3mo Uploader: FOSDEM
Topics: Youtube, video, Science & Technology
BSides San Francisco 2017
movies

eye 35

favorite 0

comment 0

Advanced Internet dataset combinations for #ThreatHunting & Attack Prediction Have you ever had to look up an IP address, domain name, or URL to decide if it is a threat, and if it is targeting you?, Do you ever need to analyze what what malicious action it just took on your potentially-compromised users? If yes - this session is for you! It's time to move beyond simple Whois & PDNS lookups, and noisy threat feeds. Learn how to combine SSL cert facet data with tracking IDs like Google...
Topics: Youtube, video, Science & Technology
FOSDEM 2018
by FOSDEM
movies

eye 12

favorite 0

comment 0

by Vissarion Fysikopoulos At: FOSDEM 2018 Room: AW1.126 Scheduled start: 2018-02-04 13:00:00+01 Source: https://www.youtube.com/watch?v=80nTr09x8Rk Uploader: FOSDEM
Topics: Youtube, video, Science & Technology
https://media.ccc.de/v/35c3-9629-snakes_and_rabbits_-_how_ccc_shaped_an_open_hardware_success This talk will present a historical narrative of the background behind how the NeTV + Milkymist inspire the HDMI2USB then helped the NeTV2 projects and how they all became interlinked through events like Congress! From the study of this history, we will attempt to distill a few core lessons learned that can hopefully be applied to other open hardware projects. Open hardware projects tend to evolve...
Topics: Youtube, video, Education, refreshingmemories, leipzig, congress, chaos, 2018, Hardware &...
FOSDEM 2019
by FOSDEM
movies

eye 29

favorite 0

comment 0

by Johannes Kliemann At: FOSDEM 2019 https://video.fosdem.org/2019/AW1.125/ada_bindings.webm Writing Ada bindings for C and especially for C++ is a tedious but not necessarily sophisticated task. There are several approaches to both C and C++ but many of them lack desired language features, generate non-compilable code or are project specific. With Cappulada (a coinage of coupling, CPP and Ada made pronounceable) we try a more general approach that aims to support complex language features such...
Topics: Youtube, video, Science & Technology
FOSDEM 2019
movies

eye 21

favorite 0

comment 0

by Petr Špaček At: FOSDEM 2019 https://video.fosdem.org/2019/K.4.601/dns_dnssec_security_without_maintenance.webm We will show how to use open-source DNS server "Knot DNS" to automatically sign and maintain DNS zones, and how to automate DNSSEC maintenance. Today DNSSEC technology is mature and automation tools are available for all tasks. In this talk we will show how to use open-source DNS server "Knot DNS" to sign your DNS zone and publish keys with little effort, and...
Topics: Youtube, video, Science & Technology
HOPE XI
by Channel2600
movies

eye 14

favorite 0

comment 0

Sunday, July 24, 2016: 11:00 am (Lamarr): A report on the new LinkNYC kiosks’ origins, legislation, design, manufacture, installation, and operation, along with the civil liberties threat they pose and options we can implement to inhibit and avoid their spying capabilities. Benjamin Dean, Mariko Hirose Source: https://www.youtube.com/watch?v=EBrZ_Ra5hFw Uploader: Channel2600
Topics: Youtube, video, Science & Technology, hack, hacking, hacker, hackers, computer, telephone,...
35 Chaos Communication Congress
movies

eye 7

favorite 0

comment 0

https://media.ccc.de/v/35c3-10019-internet_the_business_side a try to explain the ecosystem Net neutrality, a big buzzword in the last years. It is not only a buzzword? There are economic reasons why it is a stake. This talk tries to give an overview and explain how money is made in the "internet" and how it is related to net neutrality. Topics discussed: - Early Days and the Finance behind the Internet / Darpanet - "Day 0" of the Internet as we know it today - Step By Step...
Topics: Youtube, video, Education, refreshingmemories leipzig congress chaos 2018 Ethics, Society &...
BSides San Francisco 2017
movies

eye 40

favorite 0

comment 0

Should I Pay or Should I Go? Game Theory and Ransomware Ransomware infections are nasty and potentially devastating events that can cripple large companies and home computers alike. Ransomware comes in many varieties and works in different ways, but the basic scenario is the same: cybercriminals infect your computer with malicious software that blocks access to your system or important files until you pay the ransom. You have a finite amount of days to pay if you ever want to see your files...
Topics: Youtube, video, Science & Technology
Black Hat Conference
movies

eye 26

favorite 0

comment 0

by Lynn Terwoerds Voice enabled technology provides developers with great innovation opportunities as well as risks. The Voice Privacy Alliance created a set of 39 Agile security stories specifically for voice enabled IoT products as part of the Voice Privacy Innovation Toolkit. These security stories help product owners and security developer focals bake security into their voice enabled products to save time, money and decrease incidents and reputation damage. This is a very practical,...
Topics: Youtube, video, People & Blogs, BlackHat, Black Hat
33 Chaos Communication Congress
movies

eye 30

favorite 0

comment 0

/redirect?v=KISMlKR-qmQ&event=video_description&redir_token=GuDWgiYWYWHReQQ-UqJI-fzEFa18MTUwOTgzMjYxMEAxNTA5NzQ2MjEw&q=https%3A%2F%2Fmedia.ccc.de%2Fv%2F33c3-8072-liberte_egalite_fraternite_and_privacy France is under a state of emergency since November 2015. Several laws and a more intrusive surveillance framework, infringing rights and freedoms, have been adopted these recent years in the name of the fight against terrorism. Agnes Christopher Talib Source:...
Topics: Youtube, video, Education, 33C3, CCC, Chaos, Communicaion, Congress, Hamburg, Works, for, me
Black Hat Conference
movies

eye 33

favorite 0

comment 0

by Christopher Liebchen & Ahmad-Reza Sadeghi & Andrei Homescu & Stephen Crane Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Until now, no countermeasure has been able to fully prevent sophisticated exploitation techniques, such as return-oriented programming (ROP). Recent control-flow integrity (CFI) defenses from Google and Microsoft can be bypassed by constructing a ROP payload that adheres to the control-flow constraints or by...
Topics: Youtube, video, People & Blogs, Black Hat, Black Hat USA 2015, BlackHat
Black Hat Conference
by Black Hat
movies

eye 29

favorite 0

comment 0

by Timothy Morgan & Jason Morgan Timing side-channel attacks are a well-known class of flaw in cryptographic systems and applications in general. While these issues have been researched for decades, the complexities involved in obtaining accurate timing measurements and performing accurate statistical analysis has prevented the average pentester from identifying and exploiting these issues on a day-to-day basis. In this paper, we build on past research to make remote timing attacks...
Topics: Youtube, video, People & Blogs, Black Hat USA 2015, Black Hat, BlackHat
DEFCON 21
movies

eye 90

favorite 0

comment 0

Doing Bad Things to 'Good' Security Appliances PHORKUS (MARK CAREY) CHIEF SCIENTIST, PEAK SECURITY EVILROB (ROB BATHURST) THAT GUY The problem with security appliances is verifying that they are as good as the marketing has lead you to believe. You need to spend lots of money to buy a unit, or figure out how to obtain it another way; we chose eBay. We now have a hardened, encrypted, AES 256 tape storage unit and a mission, break it every way possible! We're going to dive into the finer points...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
BSides San Francisco 2018
by Security BSides San Francisco
movies

eye 17

favorite 0

comment 0

Robby Cochran - Listen to your Engine: Unearthing Security Signals from the Modern Linux Kernel Observing all kernel events can be like descending into the steam-engine of an airship – the machinery of system calls can be arcane, complicated and very, very noisy. Buried in this cacophony, though, can be indicators of privilege escalation, resource abuse or side-channel attacks. In this talk, we revisit the well-trodden system call but with fresh eyes (goggles). In a cloud-native world,...
Topics: Youtube, video, Science & Technology
SHA 2017
by SHA2017
movies

eye 10

favorite 0

comment 0

https://media.ccc.de/v/SHA2017-65-time_stretching_bpmdj How to modify the speed of audio without altering its pitch ? #Making Werner Van Belle Source: https://www.youtube.com/watch?v=LK_lVXymX4g Uploader: SHA2017 Upload date: 2017-08-07
Topics: Youtube, video, Education, SHA, SHA2017, hacking, Hacker camp, Netherlands, Scoutinglandgoed,...
DEFCON 25
movies

eye 35

favorite 0

comment 0

Windows Defender Advanced Threat Protection will soon be available for all Blue Teams to utilize within Windows 10 Enterprise, which includes detection of post breach tools, tactics and techniques commonly used by Red Teams, as well as behavior analytics. Combined with Microsoft Advanced Threat Analytics for user behavior analytics across the Domain, Red Teamers will soon face a significantly more challenging time maintaining stealth while performing internal recon, lateral movement, and...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEFCON 25, DEF CON 25, DEFCON 2017,...
Black Hat Conference
movies

eye 99

favorite 0

comment 0

by Willis Vandevanter In this 25-minute briefing, we will discuss techniques for exploiting XXE vulnerabilities in File Parsing/Upload functionality. Specifically, XML Entity Attacks are well known, but their exploitation inside XML supported file formats such as docx, xlsx, pptx, and others are not. Discussing the technically relevant points step by step, we will use real world examples from products and recent bug bounties. Finally, in our experience, creating 'XXE backdoored' files can be a...
Topics: Youtube, video, People & Blogs, BlackHat, Black Hat USA 2015, Black Hat
33 Chaos Communication Congress
movies

eye 10

favorite 0

comment 0

/redirect?v=M1wUaLnpmZQ&redir_token=WDzhxwOwfM2qg-ya42WQZ8JqK-t8MTUwOTgyNjQ4MUAxNTA5NzQwMDgx&q=https%3A%2F%2Fmedia.ccc.de%2Fv%2F33c3-7960-fnord-jahresruckblick&event=video_description Wir helfen euch, die Fnords zu sehen! Wenn mal wieder der Zensor pinkeln war, wenn DAMIT ja wohl NIEMAND rechnen konnte, wenn es um demokratisch legitimiertes Baumanagement oder um Stahlbälle geht, dann ist es wieder an der Zeit für eine lockere Abendshow mit den High- und Lowlights des Jahres....
Topics: Youtube, video, Education, 33C3, CCC, Chaos, Communicaion, Congress, Hamburg, Works, for, me
35 Chaos Communication Congress
by media.ccc.de
movies

eye 11

favorite 0

comment 0

https://media.ccc.de/v/35c3-9506-freude_ist_nur_ein_mangel_an_information Ein Demotivationsworkshop zur politischen Lage. Nico Semsrott hat in Zeiten des globalen Rechtsrucks den überflüssigsten Job der Welt: Er ist Demotivationstrainer. Mit Powerpointpräsentationen und viel Pessimismus schafft er es, komplexe Themen zu vereinfachen, ohne dabei auf alternative Fakten zurückgreifen zu müssen. Politisch gesehen ist zwar alles aussichtslos. Aber wenn man schon aufgibt, kann man man genauso...
Topics: Youtube, video, Education, refreshingmemories, leipzig, congress, chaos, 2018, Entertainment, Day...
34 Chaos Communication Congress
movies

eye 14

favorite 0

comment 0

https://media.ccc.de/v/34c3-9028-internet_censorship_in_the_catalan_referendum Overview of how the state censored and how it got circumvented On October 1st the Catalan society held a referendum to decide if they wanted to stay part of the Spanish state or create an independent state. This talk will explain the internet censorship which took place in the weeks before the referendum, on the very same day as well as in the timer after the referendum. The talk will focus on the methods used by the...
Topics: Youtube, video, Education, tuwat leipzig congress chaos 2017 Ethics, Society & Politics Day 3...
34 Chaos Communication Congress
by media.ccc.de
movies

eye 23

favorite 0

comment 0

/redirect?v=QCsvBFFLsqE&event=video_description&redir_token=6c_PJTSOBu3qbs_L3taQh3dpvXN8MTUxNTc4OTkyMkAxNTE1NzAzNTIy&q=https%3A%2F%2Fmedia.ccc.de%2Fv%2F34c3-9075-latticehacks Fun with lattices in cryptography and cryptanalysis Lattices are an extremely useful mathematical tool for cryptography. This talk will explain the basics of lattices in cryptography and cryptanalysis. It’s an exciting time for public-key cryptography. With the threat of practical quantum computers looming in...
Topics: Youtube, video, Education, tuwat, leipzig, congress, chaos, 2017, Security, Day 2, Saal Adams, 34c3...
Hack In The Box Security Conference
movies

eye 22

favorite 0

comment 0

KEYNOTE MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ KEYNOTE ABSTRACT: Organized criminals, nation-state groups and hacktivists continue to wreak havoc within organizations of all sizes in spite of their security teams' best efforts. Are security teams just not getting it? No -- it's just that security teams today must face unknown and unexpected attacks when there is a legacy over-reliance on antiquated incident management processes, an over-dependence on obsolete...
Topics: Youtube, video, Science & Technology, amsterdam, analytics, big data analytics, hitbsecconf,...
FOSDEM 2019
movies

eye 12

favorite 0

comment 0

by Franklin Weng At: FOSDEM 2019 https://video.fosdem.org/2019/UA2.114/server_side_solution_for_generating_odf_reports.webm The National Development Council in Taiwan have asked the OSSII, a local LibreOffice service provider, to develop a solution that can directly generate ODF reports, while the servers in public administrations do not need to change a lot. To adopt ODF and LibreOffice in Taiwan, a very important part, besides desktop applications, is to ask the reports generated from servers...
Topics: Youtube, video, Science & Technology
Cumin: Flexible and Reliable Automation for the Fleet Real life examples from the Wikimedia Foundation by Riccardo Coccioli At: FOSDEM 2018 Room: UA2.114 (Baudoux) Scheduled start: 2018-02-04 13:30:00+01 Source: https://www.youtube.com/watch?v=XfndhNTIqXI Uploader: FOSDEM
Topics: Youtube, video, Science & Technology
Hack In The Box Security Conference
by Hack In The Box Security Conference
movies

eye 19

favorite 0

comment 0

Laser cutting madness at FabLab Protospace in Utrecht, Netherlands Source: https://www.youtube.com/watch?v=ZnljqF0CNxM Uploader: Hack In The Box Security Conference
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, tenyearsinthebox, hackithebox,...
by Robert Kaiser At: FOSDEM 2019 https://video.fosdem.org/2019/AW1.126/geo_virtualreality.webm Mixed Reality (XR), i.e. Virtual and Augmented Reality, opens up new possibilities for 3D visualizations of OpenStreetMap data (OSM). With WebXR and Mozilla's A-Frame library, it's really simple to create cross-device XR experiences running right in the browser with very little code. VR Map brings all that together and allows you to walk or "fly" through a virtual model of the real world...
Topics: Youtube, video, Science & Technology
34 Chaos Communication Congress
by media.ccc.de
movies

eye 11

favorite 0

comment 0

https://media.ccc.de/v/34c3-8937-briar Resilient P2P Messaging for Everyone Briar is a peer-to-peer messaging app that is resistant to censorship and works even without internet access. The app encrypts all data end-to-end and also hides metadata by utilizing Tor onion services. Around the world communication is increasingly monitored and restricted. If communication can not be eavesdropped on, it is often blocked entirely. Less advanced states even block the entire internet nation-wide. We...
Topics: Youtube, video, Education, tuwat, leipzig, congress, chaos, 2017, Resilience, Day 4, Saal Borg,...
BSides San Francisco 2019
by Security BSides San Francisco
movies

eye 14

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=bnp_WexDM7A Uploader: Security BSides San Francisco
Topics: Youtube, video, Education
DEFCON 23
movies

eye 23

favorite 0

comment 0

Extra Materials available here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Nadeem Douba/Extras/BurpKit.jar Today's web apps are developed using a mashup of client- and server-side technologies. Everything from sophisticated Javascript libraries to third-party web services are thrown into the mix. Over the years, we've been asked to test these web apps with security tools that haven't evolved at the same pace. A common short-coming in most of these tools is their inability to...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 23, DEFCON, DC23, DC-23, hack, hacker,...
35 Chaos Communication Congress
by media.ccc.de
movies

eye 22

favorite 0

comment 0

https://media.ccc.de/v/35c3-10015-polizeigesetze Endlich viele neue Gründe zu demonstrieren Heimatminister Horst Seehofer und seine Amtskollegen in den Ländern erweitern die Rechte der Polizeien und planen ein „Musterpolizeigesetz“. Damit handelten sie sich die größten Proteste gegen Überwachungsvorhaben seit Jahren ein. Wir geben nicht nur einen Überblick über die zahlreichen Neuregelungen der Polizeigesetze in den Bundesländern, sondern berichten auch aus den Anhörungen in den...
Topics: Youtube, video, Education, refreshingmemories leipzig congress chaos 2018 Ethics, Society &...
by Roel Standaert At: FOSDEM 2018 Room: UB2.252A (Lameere) Scheduled start: 2018-02-04 10:00:00+01 Source: https://www.youtube.com/watch?v=eusYGXC7KNc Uploader: FOSDEM
Topics: Youtube, video, Science & Technology
Hack In The Box Security Conference
by Hack In The Box Security Conference
movies

eye 18

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=ewx96PsgL0s Uploader: Hack In The Box Security Conference
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2017ams, closing...
DEFCON 25
movies

eye 13

favorite 0

comment 0

How do you prepare for Internet privacy at college? This talk will provide an overview of what the threats are and how to defend against them. Following the talk, the kids can jump right in to do the privacy hacks & privacy defenses at the workstations. Source: https://www.youtube.com/watch?v=fAo3_Jl74j4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
35 Chaos Communication Congress
by media.ccc.de
movies

eye 15

favorite 0

comment 0

https://media.ccc.de/v/35c3-9925-let_s_reverse_engineer_the_universe exploring the dark There is four times more dark matter and over fifteen times more dark energy than regular matter in the universe. And we have absolutely no idea what these invisible dark substances might be. This talk will show how we know that dark energy and dark matter exist, although we cannot see them directly. This kind of reverse enigneering of the universe already revealed some interesting features of the dark...
Topics: Youtube, video, Education, refreshingmemories, leipzig, congress, chaos, 2018, Science, Day 4,...
Black Hat Conference
by Black Hat
movies

eye 20

favorite 0

comment 0

By Kang Li and Xiaoning Li "DynamoRIO and similar dynamic binary instrumentation (DBI) systems are used for program analysis, profiling, and comprehensive manipulation of binary applications. These DBI tools are critical for malware analysis, program feature collections, and virtual machine binary translations. An important aspect of these DBI tools is the transparent feature, i.e. the binary application (such as malware) being analyzed is not modified and is not aware of the runtime code...
Topics: Youtube, video, People & Blogs, Black Hat, Black Hat USA 2014, BlackHat
35 Chaos Communication Congress
movies

eye 29

favorite 0

comment 0

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development lifecycle There's a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered by a persistent few to open doors of software systems that were never meant to exist. We go behind-the-scenes to provide an inside look at the zero-day development lifecycle, breaking common misconceptions regarding this increasingly...
Topics: Youtube, video, Education, refreshingmemories, leipzig, congress, chaos, 2018, Security, Day 2,...
FOSDEM 2019
movies

eye 21

favorite 0

comment 0

by Fernando Laudares At: FOSDEM 2019 https://video.fosdem.org/2019/K.1.105/hugepages_databases.webm The introduction of the 64-bit version of the x86 architecture allowed servers to operate with much larger amounts of memory and the use of memory pages of different sizes. This talk will explore the Linux kernel implementation of HugePages in view of two of the most popular open source RDBMS, MySQL and PostgreSQL. We will be looking at how HugePages works, what is necessary to configure to make...
Topics: Youtube, video, Science & Technology
DEFCON 25
movies

eye 23

favorite 0

comment 0

Metasploit x86 shellcode has been defeated by EMET and other techniques not only in exploit payloads but through using those payloads in non-exploit situations (e.g. binary payload generation, PowerShell deployment, etc..). This talk describes taking Metasploit payloads (minus Stephen Fewer's hash API), incorporating techniques to bypass Caller/EAF[+] checks (post ASLR/DEP bypass) and merging those techniques together with automation to make something better. Source:...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
35 Chaos Communication Congress
by media.ccc.de
movies

eye 8

favorite 0

comment 0

https://media.ccc.de/v/35c3-9611-enclosure-puf Tamper Proofing Commodity Hardware and other Applications We are presenting an innovative technology, which allows verifying the authenticity, integrity and/or the physical state of an item by employing the propagation behaviour of electromagnetic waves. In particular, it enables to check for any tamper attempts for larger structures, such as off-the-shelf computers and their periphery. The technology extends existing tamper proof approaches from...
Topics: Youtube, video, Education, refreshingmemories, leipzig, congress, chaos, 2018, Security, Day 3,...