"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
…
continue reading
SheCanCode’s ‘Spilling the T’ podcast offers conversations with top female voices in the tech sector, as we plunge into the latest topics that have captured our imagination recently. Learn about a range of tech disciplines and how to establish a career in them - from coding, AI, cyber, starting a business, career transitions and even diversity in space, we lay it out bare and Spill the T on everything you need to know.
…
continue reading
Fed up with the talking heads? Matt gives you a no-holds-barred take on today’s cultural, religious, and political issues. Monday thru Thursday.
…
continue reading
Artificial intelligence is reshaping how we work, live, and lead. But what does that mean for Australian businesses? The AI Australia Podcast, hosted by Emma Bromet and Kathryn Collier, is your essential guide to understanding the AI revolution and its impact on Australian businesses. We cut through the jargon to bring you practical discussions and expert interviews on how AI is affecting everything from enterprise strategy to daily life, with a focus on ethical and responsible AI, diversity ...
…
continue reading
The definitive business podcast from the BBC. Each week, the BBC's Evan Davis is joined by bosses, entrepreneurs and industry experts, to lift the lid on how their businesses work, and what it’s like to be in charge. They discuss a big issue, a big challenge, or a big question facing their industry. From managing AI to managing millennials, from supermarkets to supercharging a new product. And our guests will share their stories of success and failure along the way. Podcasts are published ev ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
In a rapidly evolving world, it’s never been more important to remember the human side of technology. Amplify is a new podcast from Six Degrees. Each episode we’ll explore the latest developments in cloud computing, cyber security and diversity, speaking to authentic voices who will offer their insights and provide practical take home advice that you can apply in both your personal and work lives.
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
The Fun TIme Boys: Your weekly update on all the things! Movies, games, life, and everything in between! Join us each week as we discuss everything between important and stupid.
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
Produced by the Australian Institute of Company Directors (AICD) Hosted by Bennett Mason, Boardroom Confidential brings you candid conversations with some of Australia's most influential company directors, business leaders, and experts. Together, we explore their paths to the boardroom, lessons from their careers, and the ideas shaping modern governance. Whether you're an experienced director or just starting your governance journey, each episode offers practical insights into leadership, de ...
…
continue reading
Your source for Cyber Resilience. Elizabeth Green, EMEA Advisory and Cyber Lead at Dell Technologies EMEA invites leading cyber security specialists and experts to probe the key issues and share best practices for combatting current and emerging cyber threats.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
…
continue reading
Through a series of riveting, complex narratives, LONG SHADOW makes sense of what people know — and what they thought they knew — about the most pivotal moments in U.S. history, including Waco, Columbine, Y2K, 9/11, COVID-19, January 6, and beyond. Hosted by Pulitzer-finalist historian, author, and journalist Garrett Graff, this Peabody-nominated podcast has been called “rigorous, authoritative, and an electrifying listen” by the Financial Times and honored as one of the year's best podcasts ...
…
continue reading
Mike is the President of Northlink Consulting and has over 25 years working with executives and sales teams in many industries. ICU Nurse, Army Officer, Successful Salesman, and National Training Leader are a few of the business roles he's occupied prior to launching Northlink Consulting. He enjoy's traveling and is an avid SCUBA diver and helps breakdown the barriers to diversity in all areas of life.
…
continue reading
Women and people from diverse backgrounds are a rare sight in the tech industry, but WE ARE HERE. Many of us have few role models, a limited network, and a lot of hard work ahead of us. I believe those of us who found success have a duty to advocate for the underrepresented talent from our communities. That is the purpose of this show. I’m Monica Hernandez and I know the value of giving back to the community because it changed my life. A scholarship took me out of a humble neighborhood in th ...
…
continue reading
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
…
continue reading
Welcome to the Channel CEO podcast, which brings together thought leaders and innovators revolutionizing the IT industry. Host Kevin Lancaster is a serial tech entrepreneur, angel investor, and strategic advisor to several high-growth tech companies focused on the channel. We sit down with "IT superheroes" each week to cover various topics. I will cover topics ranging from social selling and marketing to creating influence. And we will dig deep into their journey as entrepreneurs, how they v ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Strategic viewpoints on business, law, and technology.
…
continue reading
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
…
continue reading
Email's Not Dead is a podcast about how we communicate with each other and the broader world through modern technologies. Email isn't dead, but it could be if we don't change how we think about it. Hosts Jonathan Torres and Eric Trinidad dive into the email underworld and come back out with a distinctive look at the way developers and marketers send email. Produced by Thomas "T-Bird" Knierien.
…
continue reading
Welcome to Safe Space from the Workplace, a podcast dedicated to helping you navigate the challenges of toxic work environments. Hosted by Wendy Cee and her co-host Kate, each episode brings in experts and survivors to discuss topics like bullying, redundancy, and neurodiversity. Whether you’re dealing with workplace stress, feeling overwhelmed, or just need a reminder that you’re not alone, this podcast offers support and guidance to help you find the light at the end of the tunnel. Join us ...
…
continue reading
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one's business and life. To our advantage, we can find King Solomon's financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the "get-rich-quick" schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
…
continue reading
1
Episode 36: Why Diversity Matters in Cyber Security
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24In this episode we are live from Cyberfest 2025 and discussing why diversity matters in Cyber Security with CyberNorth’s Thea Scott and UK Governments Stuart Frost BEM and Parisa Akaber, Siemens. Tune in as we take a deep-dive around: · Why diversity is such a critical factor in building resilient and effective cyber security teams · The important …
…
continue reading
1
I Said Everything Sucks Now And These Viewer Comments Prove It
21:14
21:14
Play later
Play later
Lists
Like
Liked
21:14Matt Walsh Show viewers agree: everything is getting worse. Now Matt is responding to your stories about about everything from the state of new construction to video games to the Amish joining in on the slop-fest. - - - Today's Sponsors: Hillsdale - Go to https://hillsdale.edu/walsh to sign up for free access to over 40 online courses. - - - DailyW…
…
continue reading
Power off! Nach vier wunderbaren Tagen kommt der Congress nun langsam zum Ende. Lasst uns zurückblicken, die Eindrücke sortieren und diese inspirierte Stimmung nach draußen tragen.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://events.ccc.de/congress/2025/hub/event/detail/closing-ceremony…
…
continue reading
Was hat sich im Jahr 2025 im Bereich IT-Sicherheit getan? Welche neuen Methoden, Buzzwords und Trends waren zu sehen? Was waren die fiesesten Angriffe und die teuersten Fehler?Wir wagen auch den IT-Security-Ausblick auf das Jahr 2026. Der ist wie immer mit Vorsicht zu genießen.Licensed to the public under http://creativecommons.org/licenses/by/4.0a…
…
continue reading
Infrastructure teams present what they did for this years congress and why they did it that way.39c3 is a big challenge to run, install power, network connectivity and other services in a short time and tear down everything even faster. This is a behind the scenes of the event infrastructure, what worked well and what might not have worked as expec…
…
continue reading
1
Breaking BOTS: Cheating at Blue Team CTFs with AI Speed-Runs (39c3)
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27After we announced our results, CTFs like Splunk's Boss of the SOC (BOTS) started prohibiting AI agents. For science & profit, we keep doing it anyways. In BOTS, the AIs solve most of it in under 10 minutes instead of taking the full day. Our recipe was surprisingly simple: Teach AI agents to self-plan their investigation steps, adapt their plans t…
…
continue reading
1
Battling Obsolescence – Keeping an 80s laser tag system alive (39c3)
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41Keeping old projects working can be an uphill battle. This talk explores how the laser tag system Q-Zar (Quasar in the UK) has been kept alive since the company behind it failed in the 90s. The challenges encountered, the lessons learnt, and how those can be applied to our own future projects to maximise the project lifetime.Looking at the effects …
…
continue reading
1
We, the EU, and 1064 Danes decided to look into YouTube: A story about how the EU gave us a law, 1064 Danes gave us their YouTube histories, and reality gave us a headache (39c3)
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25We explore what happens when Europe’s ambitious data access laws meet the messy realities of studying major digital platforms. Using YouTube as a central case, we show how the European Union’s efforts to promote transparency through the GDPR, the Digital Services Act (DSA), and the Digital Markets Act (DMA) are reshaping the possibilities and limit…
…
continue reading
1
Von Groschen und SpurLos - GNU Taler auch auf eurem Event! (39c3)
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44Willkommen in der Zukunft: Beim LUG Camp in Wipperfürth und bei den Datenspuren in Dresden wurde digital bezahlt - mit GNU Taler als Event-Bezahlsystem. Noch einfacher als Bargeld, billiger als Kartenzahlung und ohne Eingriff in die Privatsphäre der Besucher*innen. Wir zeigen euch, wie auch ihr das bei eurer nächsten (Chaos-)Veranstaltung anbieten …
…
continue reading
Der Hype um generative KI und die Gasindustrie bilden in Zeiten der Klimakrise eine bedrohliche Allianz für die Zukunft des Planeten.Obwohl die negativen Klimaauswirkungen generativer KI immer deutlicher werden, sollen in ganz Europa Großrechenzentren gebaut werden und Deutschland „KI-Nation“ werden, was ungeahnte „Wirtschaftskräfte freisetzen soll…
…
continue reading
1
Who runs the www? WSIS+20 and the future of Internet governance (39c3)
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38Abbreviations such as WSIS+20, IGF, IETF, DIEM, ICANN, PDP, ITU or W3C regularly appear in discussions about the Internet, yet often remain vague. This talk provides an update on the current state of Internet governance and explains why decisions made in United Nations processes have direct implications for technical standards, digital infrastructu…
…
continue reading
1
Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware Security Tooling (39c3)
41:42
41:42
Play later
Play later
Lists
Like
Liked
41:42Stored memory in hardware has had a long history of being influenced by light, by design. For instance, as memory is represented by the series of transistors, and their physical state represents 1's and 0's, original EPROM memory could be erased via the utilization of UV light, in preparation for flashing new memory.Naturally, whilst useful, this h…
…
continue reading
1
What You Hack Is What You Mean: 35 Years of Wiring Sense into Text (39c3)
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01Encoding isn’t just for machines — it’s how humans shape meaning. This talk traces 35 years of hacking text through the Text Encoding Initiative (TEI), a community-driven, open-source standard for describing the deep structure of texts. We’ll explore how TEI turns literature, research, and even hacker lore into machine-readable, remixable data — an…
…
continue reading
1
“End Of 10”: How the FOSS Community is Combatting Software-Driven Resource and Energy Consumption (39c3)
39:32
39:32
Play later
Play later
Lists
Like
Liked
39:32The end of free support for Windows 10 was 14 October 2025. Well, sort of. Microsoft moved the date to 2026, one more year the FOSS community can introduce users to sustainable software. 14 October is also KDE's birthday, International E-Waste Day, with International Repair Day following on 18 October. The irony is deep, but what is not ironic is t…
…
continue reading
1
CCC&T - Cosmic ray, the Climate Catastrophe and Trains. (39c3)
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42How can we predict soil moisture by measuring cosmic ray products and what have trains to do with it? Ever wondered how this Dürremonitor works, that you heared about in ther german news? These question and some more I will try to answer while I give an overview of some of the research that is done by the Helmholtz Centre for Environmental Research…
…
continue reading
1
CUII: Wie Konzerne heimlich Webseiten in Deutschland sperren (39c3)
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22Stellt euch vor, eine private Organisation aus milliardenschweren Konzernen entscheidet, welche Webseiten ihr nicht besuchen dürft - ohne Richter, ohne öffentliche Kontrolle oder Transparenz. Genau das macht die CUII in Deutschland seit Jahren.In Deutschland entscheidet eine private Organisation aus Internetanbietern und großen Unterhaltungskonzern…
…
continue reading
1
Asahi Linux - Porting Linux to Apple Silicon (39c3)
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56In this talk, you will learn how Apple Silicon hardware differs from regular laptops or desktops.We'll cover how we reverse engineered the hardware without staring at disassembly but by using a thin hypervisor that traces all MMIO access and then wrote Linux drivers.We'll also talk about how upstreaming to the Linux kernel works and how we've signi…
…
continue reading
1
I Hated All The Cross-Stitch Software So I Made My Own: My Deranged Outsider Software Suite For Making Deranged Outsider Art (39c3)
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26I wanted to design beautiful header diagrams and ASCII tables suitable for stitching on throw pillows, but found existing tools for cross-stitch design to be all wrong. I made my own set of command-line tools for building this chunky, pixelated visual art. If you've never seen a cross-stitch sampler that had bitrot, this talk will fix it.Designing …
…
continue reading
*What are atoms doing in space anyways?* This talk will provide a brief overview of applications of quantum technologies in space ranging from precise timing and inertial measurements to fundamental physics.Quantum technologies have seen a wide field of applications in medicine, geosciences, computing and communications, in many cases bridging the …
…
continue reading
1
How to keep Open Source open without leaving our communities open to threats (39c3)
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01The Four Freedoms (defined ~40 years ago) and the Four Opens (~15 years ago) for Open Source provided canonical definitions for what are the cornerstones of Open Source Software communities today. While the ethos still applies today, the cultural norms that blossomed to put it into practice are from an era with different challenges.To build a bette…
…
continue reading
1
Die große Datenschutz-, Datenpannen- und DS-GVO-Show (39c3)
1:34:21
1:34:21
Play later
Play later
Lists
Like
Liked
1:34:21Datenschutz darf auch Spaß machen, und alle können dabei etwas lernen, egal ob Einsteiger oder Profi-Hacker: Bei dem Datenschutz- und Datenpannen-Quiz kämpfen vier Kandidat:innen aus dem Publikum zusammen mit dem Publikum um den Sieg. Nicht nur Wissen rund um IT-Sicherheit und Datenschutz sondern auch eine schnelle Reaktion und das nötige Quäntchen…
…
continue reading
1
Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities (39c3)
45:14
45:14
Play later
Play later
Lists
Like
Liked
45:14Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018. However, their most common critique is that these types of vulnerabilities are not really practical. Even though it is cool to leak `/etc/shadow` with a CPU bug, it has limited real-world impact. In this talk, we take Spectre out for a walk and let it see …
…
continue reading
1
Verschlüsselung brechen durch physischen Zugriff - Smartphone Beschlagnahme durch Polizei (39c3)
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16Eine zwar profane Methode der Überwachung, die Polizeibehörden in Deutschland jedoch hunderttausendfach anwenden, ist das Auslesen von Daten beschlagnahmter Smartphones und Computer. Dazu nutzt die Polizei Sicherheitslücken der Geräte mithilfe forensischer Software von Herstellern wie Cellebrite oder Magnet aus. Die Verfassungsmäßigkeit der Rechtsg…
…
continue reading
PRÜF! Prüfung Rettet übrigens Freiheit!Alles wird in Deutschland geprüft. Warum nicht auch mutmaßlich verfassungswidrige Parteien? Hier stelle ich vor, was PRÜF! anders machen will als bisherige Kampagnen.Wir haben eine Forderung: „Alle Parteien, die vom Verfassungsschutz als rechtsextremer Verdachtsfall oder gesichert rechtsextrem eingestuft werde…
…
continue reading
1
Von Fuzzern zu Agenten: Entwicklung eines Cyber Reasoning Systems für die AIxCC (39c3)
52:47
52:47
Play later
Play later
Lists
Like
Liked
52:47Die AI Cyber Challenge (AIxCC) der DARPA hatte zum Ziel, die Grenzen der autonomen Cybersicherheit zu erweitern: Können AI-Systeme Software-Schwachstellen unabhängig, in Echtzeit und ohne menschliche Hilfe identifizieren, verifizieren und beheben?Im Laufe von zwei Jahren entwickelten Teams aus aller Welt „Cyber Reasoning Systems“ (CRS), die in der …
…
continue reading
1
Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM (39c3)
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26Last year at 38c3, we gave a talk titled "Ten Years of Rowhammer: A Retrospect (and Path to the Future)."In this talk, we summarized 10 years of Rowhammer research and highlighted gaps in our understanding.For instance, although nearly all DRAM generations from DDR3 to DDR5 are vulnerable to the Rowhammer effect, we still do not know its real-world…
…
continue reading
1
Human microservices at the Dutch Railways: modern architecture, ancient hardware? (39c3)
1:00:48
1:00:48
Play later
Play later
Lists
Like
Liked
1:00:48The Dutch railways have been operating an increasingly complicated network of trains for over 80 years. The task of overseeing it is far too complex for a single human. As such, a network of specifically scoped humans has been connected. Over time, computers and software have been introduced into the system, but today there is still a significant r…
…
continue reading
1
Peep-Show für die Polizei. Staatliche Überwachung von Queers in Hamburger Toiletten bis 1980 (39c3)
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47Oder: Wie die Hamburger Polizei queere Menschen auf öffentlichen Toiletten observierte, und wie ein anonymes Kollektiv im Juli 1980 dieses Überwachungsystem wortwörtlich mit dem Hammer zerschlagen hat. Ein analoger Überwachungskrimi mit sauberen Städten, lichtscheuen Elementen, queerem Aktivismus, und kollektiver Selbstorganisation; und mit einer A…
…
continue reading
Science is hard and research into the usage of the Tor network is especially so. Since it was designed to counter suveillance, it gathering reliable information is difficult. As a consequence, the studies we do have, have yielded very different results.This talk investigates the root causes of contradicting studies by highlighting how slight change…
…
continue reading
1
The Spectrum - Hackspace Beyond Hacking (39c3)
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32The Spectrum is a newly founded queer-feminist, intersectional hackspace centering FLINTA+, disabled, and marginalized beings. We see hacking as playful exploration—of technology, art, and ideas—to reimagine what inclusion and collaboration can be. At 39C3, we share how awareness, accessibility, and transdisciplinary creation can transform communit…
…
continue reading
1
The Heartbreak Machine: Nazis in the Echo Chamber (39c3)
44:51
44:51
Play later
Play later
Lists
Like
Liked
44:51WhiteDate ist eine Plattform weißer Suprematist:innen, die sich an Rassist:innen und Antisemit:innen richtet – und auf veralteter Infrastruktur basiert. Was die 8000 Mitglieder nicht wussten: Einige der Nazis flirteten dieses Jahr mit realistisch wirkenden Chatbots - und verliebten sich sogar in sie. Mit einer Kombination aus automatisierter Konver…
…
continue reading
Let's have a (hopefully) final look at Diesel emission cheating. This technical talk summarizes what I learned by reverse-engineering dozens of engine ECU software, how I found and characterized "interesting logic" which, more often than not, ended up being a court-approved "defeat device".What started as a "curious investigation" in 2015 to obtain…
…
continue reading
1
Hegemony Eroding: Excavating Diversity in Latent Space (39c3)
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Hegemony Eroding is an ongoing art project exploring how generative AI reflects and distorts cultural representation. Its name speaks to its core ambition: to bear witness to the slow erosion of Western cultural hegemony by exposing the cracks in which other cultures shine through.This talk will discuss the blurry boundary between legitimate cultur…
…
continue reading
1
Race conditions, transactions and free parking (39c3)
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51ORM's and/or developers don't understand databases, transactions, or concurrency.After the [Air France-KLM dataleak](https://media.ccc.de/v/37c3-lightningtalks-58027-air-france-klm-6-char-short-code) I kept repeating this was not a real hack, and confessed I always wanted to hack a system based on triggering race conditions because the lack of prop…
…
continue reading
1
Holiday Archive - David Kirk on investing in Australia's tech start-ups, what big companies can learn from small ones, and how to prepare for board meetings
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58Over the holidays, we'll be bringing you some earlier episodes of our Boardroom Confidential podcast. This time it's David Kirk, the co-founder of listed venture capital fund Bailador and chair at a range of organisations including KMD Brands, Forsyth Barr and KiwiHarvest. David was also the CEO of Fairfax Limited and had an extremely successful ca…
…
continue reading
1
Aber hier Leben? Nein danke! …oder doch? Wie wir der autoritären Zuspitzung begegnen können. (39c3)
57:49
57:49
Play later
Play later
Lists
Like
Liked
57:49Im Osten stehen nächstes Jahr schon wieder Wahlen an und schon wieder sieht alles danach aus, als ob die AfD eine Regierungsbeteiligung bekommen könnte. Ganz konkret: In Sachsen-Anhalt und Mecklenburg-Vorpommern. Nicht nur diese "rosigen" Aussichten, sondern auch aktuelle Bevölkerungsprognosen werfen gar kein günstiges Licht auf die Regionen. Linke…
…
continue reading
1
Denkangebot: Rainer Mühlhoff über KI und autoritäre Sehnsüchte im Silicon Valley (39c3)
1:31:55
1:31:55
Play later
Play later
Lists
Like
Liked
1:31:55Der Hype um künstliche Intelligenz ist allgegenwärtig. Selbst Donald Trump postet KI-generierte Videos, in denen er sich wahlweise als Rockstar oder Kampfjetpilot inszeniert. Elon Musk prahlte öffentlich damit, dass in seinem "Department of Goverment Efficiency" der soziale Kahlschlag mit Unterstützung Künstlicher Intelligenz vorangetrieben wird. U…
…
continue reading
Wer nutzt in Deutschland Software von Palantir und wer hat das in naher Zukunft vor? Was sind die rechtlichen Voraussetzungen für den Einsatz solcher Analysewerkzeuge? Und was plant Innenminister Alexander Dobrindt in Sachen Palantir für die Polizeien des Bundes?Software von Palantir analysiert für Polizeien und Militär deren Daten – dafür lizenzie…
…
continue reading
1
The Angry Path to Zen: AMD Zen Microcode Tools and Insights (39c3)
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33[EntrySign](https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking) opened the door to custom microcode on AMD Zen CPUs earlier this year. Using a weakness in the signature verification we can load custom microcode updates and modify behavior of stock AMD Zen 1-5 CPUs. While AMD has released patches to address this…
…
continue reading
1
Build a Fake Phone, Find Real Bugs (39c3)
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01Mobile phones are central to everyday life: we communicate, entertain ourselves, and keep vast swaths of our digital lives on them. That ubiquity makes high-risk groups such as journalists, activists, and dissidents prime targets for sophisticated spyware that exploits device vulnerabilities.On Android devices, GPU drivers have repeatedly served as…
…
continue reading
Agentic AI is the catch-all term for AI-enabled systems that propose to complete more or less complex tasks on their own, without stopping to ask permission or consent. What could go wrong? These systems are being integrated directly into operating systems and applications, like web browsers. This move represents a fundamental paradigm shift, trans…
…
continue reading
1
Netzpolitik in der Schweiz: Zwischen Bodensee und Matterhorn (39c3)
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Auch in der Schweizer Netzpolitik ging es im auslaufenden Jahr drunter und drüber. Wir blicken mit gewohntem Schalk auf das netzpolitische Jahr 2025 zwischen Bodensee und Matterhorn zurück - und diskutieren jene Themen, die relevant waren und relevant bleiben.**Themen sind unter anderem:****E-ID und E-Collecting:** Die netzpolitische Community hat …
…
continue reading
1
WissPod Jahresrückblick 2025 oder: KI in der Wissenschaft!? (39c3)
1:29:13
1:29:13
Play later
Play later
Lists
Like
Liked
1:29:13Wie die letzten Jahre gute Tradition geworden ist, blicken Melanie Bartos und Bernd Rupp zurück auf das wissenschaftspodcasts.de-Jahr 2025 und sprechen über die Perspektiven, die sich für das Wissenschaftspodcast-Jahr 2026 abzeichnen.Dabei beleuchten wir die Herausforderungen bei der Kuration, die Anmeldezahlen neuer Wissenschaftspodcasts, die Weit…
…
continue reading
1
The Modular Workshop – The Tunegirl und Rob StrobE (39c3)
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05Hallo CCC Community,wir präsentieren euch The Tunegirl und Rob StrobE, beide sind mit Veröffentlichungen auf dem Assassins Soldier Label beheimatet und blicken auf eine gemeinsame Liebe für Detroit Techno.Die Idee zum gemeinsamen Workshop für euch entstand natürlich auf dem Dancefloor und The Tunegirl hat die Cases gepackt und nach Hamburg gebracht…
…
continue reading
1
Wer liegt hier wem auf der Tasche? (39c3)
56:59
56:59
Play later
Play later
Lists
Like
Liked
56:59Das Bürgergeld ist Geschichte. An seine Stelle tritt eine Grundsicherung, die auf kalkulierten Verfassungsbruch setzt. Totalsanktionen, Vermittlungsvorrang, Quadratmeterdeckel, jeder Move bedeutet umfassendere staatliche Überwachung. Die Bezahlkarte soll in Hamburg perspektivisch zunächst auf Sozialhilfe‑ und Jugendhilfebeziehende ausgeweitet werde…
…
continue reading
1
Schlechte Karten - IT-Sicherheit im Jahr null der ePA für alle (39c3)
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19Seit Mitte 2025 steht die elektronische Patientenakte für alle zur Verfügung – nach ein paar kleineren oder größeren Sicherheitsproblemen im Vorfeld, sei es vor einem Jahr auf dem 38C3 oder Ende April zum deutschlandweiten Start. Zeit ein Fazit zu ziehen: Ist die ePA jetzt sicher? Wurden nachhaltige Veränderungen durchgeführt, die zu mehr Sicherhei…
…
continue reading
1
Set-top box Hacking: freeing the 'Freebox' (39c3)
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43The French ISP 'Free' was the first to introduce a set-top box in France in 2002, named the Freebox. Four years later, the fifth version of the Freebox was released and distributed to customers. It comprises two devices: a router, and a PVR called the Freebox HD, both running Linux. The Freebox HD had innovative features at the time, such as live t…
…
continue reading
1
The Last of Us - Fighting the EU Surveillance Law Apocalypse (39c3)
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21The virus of surveillance is spreading across the European Union. In the form of its "ProtectEU" Internal Security Strategy, the European Commission is planning to attack encryption, re-introduce mandatory data retention and strengthen Europol and Frontex, the main agents of its oppressive law enforcement infrastructure. In this talk, we will journ…
…
continue reading
1
Why Did Fun American Neighborhoods Vanish? This Might Be The Reason
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Fun American neighborhoods have suddenly seemed to vanish, but what caused them to disappear? - - - Today's Sponsor: Balance of Nature - New and existing customers can go to https://balanceofnature.com and get 50% off the Whole Health System FOR LIFE. - - - 🎄✨ DAILY WIRE CHRISTMAS SALE IS HERE! ✨🎄 🎁 https://www.dailywire.com/subscribe ⭐️ 40% Off Da…
…
continue reading
1
Och Menno X Disconnected Unexpected : Elbonian Incident Response : Wie reagiere ich falsch (39c3)
1:22:42
1:22:42
Play later
Play later
Lists
Like
Liked
1:22:42Jeder redet darüber wie man eine Krise optimal bearbeitet. Bei Disconnected Unexpected geht es ja darum das das Publikum ein Szenario in den Raum wirft und Teams versuchen eine optimale Lösung zu finden. Bei Och Menno geht es darum das Sachen schief gehen. In der großen Nation Elbonien geht es darum das immer die komplizierteste, gerechtfertigte Lö…
…
continue reading