Ytre Randesund misjonskirke holder til i Ytre Randesund utenfor Kristiansand
…
continue reading
Taler fra møtene i Misjonssalen i Sandnes www.misjonssalen.no
…
continue reading
En liten spilleliste med gode podcaster
…
continue reading
Taler i fra Betania
…
continue reading
Lytt til taler og undervisning fra gudstjenester og studio i Bogafjell kirke. Vurder gjerne å rangere oss, og del episoder du liker med venner. For mer informasjon om menigheten vår, se kirken.no/bogafjell.
…
continue reading
Bedehuskirken på Bryne
…
continue reading
Espresso Yourself med Barbara Aurelia Er du klar til en stærk dosis ægte samtale? Join mig, Barbara, når jeg sætter mig ned med spændende gæster for at dykke ned i samfundets særheder, livets mysterier og de store spørgsmål, vi alle tænker over, men sjældent taler om. Hver episode er en blanding af grin, indsigt og ufiltrerede perspektiver, der udfordrer det almindelige. Hvis du er til tankevækkende emner, uventede afsløringer og lidt ekstra brændstof til hjernen, så grib en espresso (martin ...
…
continue reading
Velkommen til denne Podcastkanalen. Her deler vi oppmuntrende taler, refleksjoner og intervjuer. Med Daniel Haddal
…
continue reading
Gitte "enerGitte" Koldtoft taler med erhvervsledere, entreprenører, foredragsholdere og forfattere der bidrager med viden om, hvordan du kan højne din mentale og fysiske energi - både privat og på jobbet.
…
continue reading
A podcast about free and open source software, communism and the revolution
…
continue reading
Nåede du det? er et program, hvor Kirsten, Mia og Pernille taler om alt det de nåede - og ikke nåede - i løbet af ugen. Både bøger, event og film er i kikkerten, når FOMO’en trevles igennem, så lyt med hver torsdag klokken 19:00 live!
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Oda Bjerkan, adm. dir. i UN Global Compact Norge, og Øystein Eriksen Søreide, adm. dir. i Abelia, inviterer innflytelsesrike stemmer for å snakke om bærekraft og business. Produsent: Kristin Steenfeldt-Foss Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Von Groschen und SpurLos - GNU Taler auch auf eurem Event! (39c3)
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44Willkommen in der Zukunft: Beim LUG Camp in Wipperfürth und bei den Datenspuren in Dresden wurde digital bezahlt - mit GNU Taler als Event-Bezahlsystem. Noch einfacher als Bargeld, billiger als Kartenzahlung und ohne Eingriff in die Privatsphäre der Besucher*innen. Wir zeigen euch, wie auch ihr das bei eurer nächsten (Chaos-)Veranstaltung anbieten …
…
continue reading
Torbjørg Olines tale fra årets første julaftengudstjenesteBy [email protected] (Torbjørg Oline)
…
continue reading
1
Julegudstjeneste fra Østfoldkirken - Kenneth Moe taler
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55Velkommen til vår Gudstjeneste fra Østfoldkirken. I dag er det Julegudstjeneste med andakt fra pastor Kenneth Moe. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Forankring og framdrift (de 4 T-ene)By Svein Anton Hansen
…
continue reading
Power off! Nach vier wunderbaren Tagen kommt der Congress nun langsam zum Ende. Lasst uns zurückblicken, die Eindrücke sortieren und diese inspirierte Stimmung nach draußen tragen.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://events.ccc.de/congress/2025/hub/event/detail/closing-ceremony…
…
continue reading
Infrastructure teams present what they did for this years congress and why they did it that way.39c3 is a big challenge to run, install power, network connectivity and other services in a short time and tear down everything even faster. This is a behind the scenes of the event infrastructure, what worked well and what might not have worked as expec…
…
continue reading
Was hat sich im Jahr 2025 im Bereich IT-Sicherheit getan? Welche neuen Methoden, Buzzwords und Trends waren zu sehen? Was waren die fiesesten Angriffe und die teuersten Fehler?Wir wagen auch den IT-Security-Ausblick auf das Jahr 2026. Der ist wie immer mit Vorsicht zu genießen.Licensed to the public under http://creativecommons.org/licenses/by/4.0a…
…
continue reading
1
Breaking BOTS: Cheating at Blue Team CTFs with AI Speed-Runs (39c3)
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27After we announced our results, CTFs like Splunk's Boss of the SOC (BOTS) started prohibiting AI agents. For science & profit, we keep doing it anyways. In BOTS, the AIs solve most of it in under 10 minutes instead of taking the full day. Our recipe was surprisingly simple: Teach AI agents to self-plan their investigation steps, adapt their plans t…
…
continue reading
1
Battling Obsolescence – Keeping an 80s laser tag system alive (39c3)
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41Keeping old projects working can be an uphill battle. This talk explores how the laser tag system Q-Zar (Quasar in the UK) has been kept alive since the company behind it failed in the 90s. The challenges encountered, the lessons learnt, and how those can be applied to our own future projects to maximise the project lifetime.Looking at the effects …
…
continue reading
1
We, the EU, and 1064 Danes decided to look into YouTube: A story about how the EU gave us a law, 1064 Danes gave us their YouTube histories, and reality gave us a headache (39c3)
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25We explore what happens when Europe’s ambitious data access laws meet the messy realities of studying major digital platforms. Using YouTube as a central case, we show how the European Union’s efforts to promote transparency through the GDPR, the Digital Services Act (DSA), and the Digital Markets Act (DMA) are reshaping the possibilities and limit…
…
continue reading
Der Hype um generative KI und die Gasindustrie bilden in Zeiten der Klimakrise eine bedrohliche Allianz für die Zukunft des Planeten.Obwohl die negativen Klimaauswirkungen generativer KI immer deutlicher werden, sollen in ganz Europa Großrechenzentren gebaut werden und Deutschland „KI-Nation“ werden, was ungeahnte „Wirtschaftskräfte freisetzen soll…
…
continue reading
1
Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware Security Tooling (39c3)
41:42
41:42
Play later
Play later
Lists
Like
Liked
41:42Stored memory in hardware has had a long history of being influenced by light, by design. For instance, as memory is represented by the series of transistors, and their physical state represents 1's and 0's, original EPROM memory could be erased via the utilization of UV light, in preparation for flashing new memory.Naturally, whilst useful, this h…
…
continue reading
1
Who runs the www? WSIS+20 and the future of Internet governance (39c3)
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38Abbreviations such as WSIS+20, IGF, IETF, DIEM, ICANN, PDP, ITU or W3C regularly appear in discussions about the Internet, yet often remain vague. This talk provides an update on the current state of Internet governance and explains why decisions made in United Nations processes have direct implications for technical standards, digital infrastructu…
…
continue reading
1
CCC&T - Cosmic ray, the Climate Catastrophe and Trains. (39c3)
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42How can we predict soil moisture by measuring cosmic ray products and what have trains to do with it? Ever wondered how this Dürremonitor works, that you heared about in ther german news? These question and some more I will try to answer while I give an overview of some of the research that is done by the Helmholtz Centre for Environmental Research…
…
continue reading
1
“End Of 10”: How the FOSS Community is Combatting Software-Driven Resource and Energy Consumption (39c3)
39:32
39:32
Play later
Play later
Lists
Like
Liked
39:32The end of free support for Windows 10 was 14 October 2025. Well, sort of. Microsoft moved the date to 2026, one more year the FOSS community can introduce users to sustainable software. 14 October is also KDE's birthday, International E-Waste Day, with International Repair Day following on 18 October. The irony is deep, but what is not ironic is t…
…
continue reading
1
CUII: Wie Konzerne heimlich Webseiten in Deutschland sperren (39c3)
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22Stellt euch vor, eine private Organisation aus milliardenschweren Konzernen entscheidet, welche Webseiten ihr nicht besuchen dürft - ohne Richter, ohne öffentliche Kontrolle oder Transparenz. Genau das macht die CUII in Deutschland seit Jahren.In Deutschland entscheidet eine private Organisation aus Internetanbietern und großen Unterhaltungskonzern…
…
continue reading
1
What You Hack Is What You Mean: 35 Years of Wiring Sense into Text (39c3)
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01Encoding isn’t just for machines — it’s how humans shape meaning. This talk traces 35 years of hacking text through the Text Encoding Initiative (TEI), a community-driven, open-source standard for describing the deep structure of texts. We’ll explore how TEI turns literature, research, and even hacker lore into machine-readable, remixable data — an…
…
continue reading
1
I Hated All The Cross-Stitch Software So I Made My Own: My Deranged Outsider Software Suite For Making Deranged Outsider Art (39c3)
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26I wanted to design beautiful header diagrams and ASCII tables suitable for stitching on throw pillows, but found existing tools for cross-stitch design to be all wrong. I made my own set of command-line tools for building this chunky, pixelated visual art. If you've never seen a cross-stitch sampler that had bitrot, this talk will fix it.Designing …
…
continue reading
1
Asahi Linux - Porting Linux to Apple Silicon (39c3)
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56In this talk, you will learn how Apple Silicon hardware differs from regular laptops or desktops.We'll cover how we reverse engineered the hardware without staring at disassembly but by using a thin hypervisor that traces all MMIO access and then wrote Linux drivers.We'll also talk about how upstreaming to the Linux kernel works and how we've signi…
…
continue reading
*What are atoms doing in space anyways?* This talk will provide a brief overview of applications of quantum technologies in space ranging from precise timing and inertial measurements to fundamental physics.Quantum technologies have seen a wide field of applications in medicine, geosciences, computing and communications, in many cases bridging the …
…
continue reading
1
How to keep Open Source open without leaving our communities open to threats (39c3)
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01The Four Freedoms (defined ~40 years ago) and the Four Opens (~15 years ago) for Open Source provided canonical definitions for what are the cornerstones of Open Source Software communities today. While the ethos still applies today, the cultural norms that blossomed to put it into practice are from an era with different challenges.To build a bette…
…
continue reading
1
Die große Datenschutz-, Datenpannen- und DS-GVO-Show (39c3)
1:34:21
1:34:21
Play later
Play later
Lists
Like
Liked
1:34:21Datenschutz darf auch Spaß machen, und alle können dabei etwas lernen, egal ob Einsteiger oder Profi-Hacker: Bei dem Datenschutz- und Datenpannen-Quiz kämpfen vier Kandidat:innen aus dem Publikum zusammen mit dem Publikum um den Sieg. Nicht nur Wissen rund um IT-Sicherheit und Datenschutz sondern auch eine schnelle Reaktion und das nötige Quäntchen…
…
continue reading
1
Verschlüsselung brechen durch physischen Zugriff - Smartphone Beschlagnahme durch Polizei (39c3)
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16Eine zwar profane Methode der Überwachung, die Polizeibehörden in Deutschland jedoch hunderttausendfach anwenden, ist das Auslesen von Daten beschlagnahmter Smartphones und Computer. Dazu nutzt die Polizei Sicherheitslücken der Geräte mithilfe forensischer Software von Herstellern wie Cellebrite oder Magnet aus. Die Verfassungsmäßigkeit der Rechtsg…
…
continue reading
PRÜF! Prüfung Rettet übrigens Freiheit!Alles wird in Deutschland geprüft. Warum nicht auch mutmaßlich verfassungswidrige Parteien? Hier stelle ich vor, was PRÜF! anders machen will als bisherige Kampagnen.Wir haben eine Forderung: „Alle Parteien, die vom Verfassungsschutz als rechtsextremer Verdachtsfall oder gesichert rechtsextrem eingestuft werde…
…
continue reading
1
Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities (39c3)
45:14
45:14
Play later
Play later
Lists
Like
Liked
45:14Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018. However, their most common critique is that these types of vulnerabilities are not really practical. Even though it is cool to leak `/etc/shadow` with a CPU bug, it has limited real-world impact. In this talk, we take Spectre out for a walk and let it see …
…
continue reading
1
Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM (39c3)
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26Last year at 38c3, we gave a talk titled "Ten Years of Rowhammer: A Retrospect (and Path to the Future)."In this talk, we summarized 10 years of Rowhammer research and highlighted gaps in our understanding.For instance, although nearly all DRAM generations from DDR3 to DDR5 are vulnerable to the Rowhammer effect, we still do not know its real-world…
…
continue reading
1
Peep-Show für die Polizei. Staatliche Überwachung von Queers in Hamburger Toiletten bis 1980 (39c3)
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47Oder: Wie die Hamburger Polizei queere Menschen auf öffentlichen Toiletten observierte, und wie ein anonymes Kollektiv im Juli 1980 dieses Überwachungsystem wortwörtlich mit dem Hammer zerschlagen hat. Ein analoger Überwachungskrimi mit sauberen Städten, lichtscheuen Elementen, queerem Aktivismus, und kollektiver Selbstorganisation; und mit einer A…
…
continue reading
1
Von Fuzzern zu Agenten: Entwicklung eines Cyber Reasoning Systems für die AIxCC (39c3)
52:47
52:47
Play later
Play later
Lists
Like
Liked
52:47Die AI Cyber Challenge (AIxCC) der DARPA hatte zum Ziel, die Grenzen der autonomen Cybersicherheit zu erweitern: Können AI-Systeme Software-Schwachstellen unabhängig, in Echtzeit und ohne menschliche Hilfe identifizieren, verifizieren und beheben?Im Laufe von zwei Jahren entwickelten Teams aus aller Welt „Cyber Reasoning Systems“ (CRS), die in der …
…
continue reading
1
Human microservices at the Dutch Railways: modern architecture, ancient hardware? (39c3)
1:00:48
1:00:48
Play later
Play later
Lists
Like
Liked
1:00:48The Dutch railways have been operating an increasingly complicated network of trains for over 80 years. The task of overseeing it is far too complex for a single human. As such, a network of specifically scoped humans has been connected. Over time, computers and software have been introduced into the system, but today there is still a significant r…
…
continue reading
Science is hard and research into the usage of the Tor network is especially so. Since it was designed to counter suveillance, it gathering reliable information is difficult. As a consequence, the studies we do have, have yielded very different results.This talk investigates the root causes of contradicting studies by highlighting how slight change…
…
continue reading
1
The Spectrum - Hackspace Beyond Hacking (39c3)
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32The Spectrum is a newly founded queer-feminist, intersectional hackspace centering FLINTA+, disabled, and marginalized beings. We see hacking as playful exploration—of technology, art, and ideas—to reimagine what inclusion and collaboration can be. At 39C3, we share how awareness, accessibility, and transdisciplinary creation can transform communit…
…
continue reading
1
The Heartbreak Machine: Nazis in the Echo Chamber (39c3)
44:51
44:51
Play later
Play later
Lists
Like
Liked
44:51WhiteDate ist eine Plattform weißer Suprematist:innen, die sich an Rassist:innen und Antisemit:innen richtet – und auf veralteter Infrastruktur basiert. Was die 8000 Mitglieder nicht wussten: Einige der Nazis flirteten dieses Jahr mit realistisch wirkenden Chatbots - und verliebten sich sogar in sie. Mit einer Kombination aus automatisierter Konver…
…
continue reading
Let's have a (hopefully) final look at Diesel emission cheating. This technical talk summarizes what I learned by reverse-engineering dozens of engine ECU software, how I found and characterized "interesting logic" which, more often than not, ended up being a court-approved "defeat device".What started as a "curious investigation" in 2015 to obtain…
…
continue reading
1
Race conditions, transactions and free parking (39c3)
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51ORM's and/or developers don't understand databases, transactions, or concurrency.After the [Air France-KLM dataleak](https://media.ccc.de/v/37c3-lightningtalks-58027-air-france-klm-6-char-short-code) I kept repeating this was not a real hack, and confessed I always wanted to hack a system based on triggering race conditions because the lack of prop…
…
continue reading
1
Hegemony Eroding: Excavating Diversity in Latent Space (39c3)
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Hegemony Eroding is an ongoing art project exploring how generative AI reflects and distorts cultural representation. Its name speaks to its core ambition: to bear witness to the slow erosion of Western cultural hegemony by exposing the cracks in which other cultures shine through.This talk will discuss the blurry boundary between legitimate cultur…
…
continue reading
Wer nutzt in Deutschland Software von Palantir und wer hat das in naher Zukunft vor? Was sind die rechtlichen Voraussetzungen für den Einsatz solcher Analysewerkzeuge? Und was plant Innenminister Alexander Dobrindt in Sachen Palantir für die Polizeien des Bundes?Software von Palantir analysiert für Polizeien und Militär deren Daten – dafür lizenzie…
…
continue reading
1
Denkangebot: Rainer Mühlhoff über KI und autoritäre Sehnsüchte im Silicon Valley (39c3)
1:31:55
1:31:55
Play later
Play later
Lists
Like
Liked
1:31:55Der Hype um künstliche Intelligenz ist allgegenwärtig. Selbst Donald Trump postet KI-generierte Videos, in denen er sich wahlweise als Rockstar oder Kampfjetpilot inszeniert. Elon Musk prahlte öffentlich damit, dass in seinem "Department of Goverment Efficiency" der soziale Kahlschlag mit Unterstützung Künstlicher Intelligenz vorangetrieben wird. U…
…
continue reading
1
Aber hier Leben? Nein danke! …oder doch? Wie wir der autoritären Zuspitzung begegnen können. (39c3)
57:49
57:49
Play later
Play later
Lists
Like
Liked
57:49Im Osten stehen nächstes Jahr schon wieder Wahlen an und schon wieder sieht alles danach aus, als ob die AfD eine Regierungsbeteiligung bekommen könnte. Ganz konkret: In Sachsen-Anhalt und Mecklenburg-Vorpommern. Nicht nur diese "rosigen" Aussichten, sondern auch aktuelle Bevölkerungsprognosen werfen gar kein günstiges Licht auf die Regionen. Linke…
…
continue reading
1
The Angry Path to Zen: AMD Zen Microcode Tools and Insights (39c3)
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33[EntrySign](https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking) opened the door to custom microcode on AMD Zen CPUs earlier this year. Using a weakness in the signature verification we can load custom microcode updates and modify behavior of stock AMD Zen 1-5 CPUs. While AMD has released patches to address this…
…
continue reading
1
Netzpolitik in der Schweiz: Zwischen Bodensee und Matterhorn (39c3)
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Auch in der Schweizer Netzpolitik ging es im auslaufenden Jahr drunter und drüber. Wir blicken mit gewohntem Schalk auf das netzpolitische Jahr 2025 zwischen Bodensee und Matterhorn zurück - und diskutieren jene Themen, die relevant waren und relevant bleiben.**Themen sind unter anderem:****E-ID und E-Collecting:** Die netzpolitische Community hat …
…
continue reading
1
Build a Fake Phone, Find Real Bugs (39c3)
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01Mobile phones are central to everyday life: we communicate, entertain ourselves, and keep vast swaths of our digital lives on them. That ubiquity makes high-risk groups such as journalists, activists, and dissidents prime targets for sophisticated spyware that exploits device vulnerabilities.On Android devices, GPU drivers have repeatedly served as…
…
continue reading
Agentic AI is the catch-all term for AI-enabled systems that propose to complete more or less complex tasks on their own, without stopping to ask permission or consent. What could go wrong? These systems are being integrated directly into operating systems and applications, like web browsers. This move represents a fundamental paradigm shift, trans…
…
continue reading
1
WissPod Jahresrückblick 2025 oder: KI in der Wissenschaft!? (39c3)
1:29:13
1:29:13
Play later
Play later
Lists
Like
Liked
1:29:13Wie die letzten Jahre gute Tradition geworden ist, blicken Melanie Bartos und Bernd Rupp zurück auf das wissenschaftspodcasts.de-Jahr 2025 und sprechen über die Perspektiven, die sich für das Wissenschaftspodcast-Jahr 2026 abzeichnen.Dabei beleuchten wir die Herausforderungen bei der Kuration, die Anmeldezahlen neuer Wissenschaftspodcasts, die Weit…
…
continue reading
1
The Modular Workshop – The Tunegirl und Rob StrobE (39c3)
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05Hallo CCC Community,wir präsentieren euch The Tunegirl und Rob StrobE, beide sind mit Veröffentlichungen auf dem Assassins Soldier Label beheimatet und blicken auf eine gemeinsame Liebe für Detroit Techno.Die Idee zum gemeinsamen Workshop für euch entstand natürlich auf dem Dancefloor und The Tunegirl hat die Cases gepackt und nach Hamburg gebracht…
…
continue reading
1
The Last of Us - Fighting the EU Surveillance Law Apocalypse (39c3)
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21The virus of surveillance is spreading across the European Union. In the form of its "ProtectEU" Internal Security Strategy, the European Commission is planning to attack encryption, re-introduce mandatory data retention and strengthen Europol and Frontex, the main agents of its oppressive law enforcement infrastructure. In this talk, we will journ…
…
continue reading
1
Schlechte Karten - IT-Sicherheit im Jahr null der ePA für alle (39c3)
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19Seit Mitte 2025 steht die elektronische Patientenakte für alle zur Verfügung – nach ein paar kleineren oder größeren Sicherheitsproblemen im Vorfeld, sei es vor einem Jahr auf dem 38C3 oder Ende April zum deutschlandweiten Start. Zeit ein Fazit zu ziehen: Ist die ePA jetzt sicher? Wurden nachhaltige Veränderungen durchgeführt, die zu mehr Sicherhei…
…
continue reading
1
Set-top box Hacking: freeing the 'Freebox' (39c3)
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43The French ISP 'Free' was the first to introduce a set-top box in France in 2002, named the Freebox. Four years later, the fifth version of the Freebox was released and distributed to customers. It comprises two devices: a router, and a PVR called the Freebox HD, both running Linux. The Freebox HD had innovative features at the time, such as live t…
…
continue reading
1
Wer liegt hier wem auf der Tasche? (39c3)
56:59
56:59
Play later
Play later
Lists
Like
Liked
56:59Das Bürgergeld ist Geschichte. An seine Stelle tritt eine Grundsicherung, die auf kalkulierten Verfassungsbruch setzt. Totalsanktionen, Vermittlungsvorrang, Quadratmeterdeckel, jeder Move bedeutet umfassendere staatliche Überwachung. Die Bezahlkarte soll in Hamburg perspektivisch zunächst auf Sozialhilfe‑ und Jugendhilfebeziehende ausgeweitet werde…
…
continue reading
1
Gegenmacht - Best of Informationsfreiheit (39c3)
55:08
55:08
Play later
Play later
Lists
Like
Liked
55:08Sind mehr Infos wirklich die Lösung? Ob Jens Spahn, Philipp Amthor oder Friedrich Merz - sie alle sagen offen, was sie vorhaben und machen keinen Hehl aus ihren Verbindungen zur Trump-Regierung, zu Milliardären und der fossilen Lobby. Was bringt Transparenz in Zeiten der autoritären Wende?Transparenz braucht Rechenschaft. Ohne Konsequenzen bleibt T…
…
continue reading
1
There is NO WAY we ended up getting arrested for this (Malta edition) (39c3)
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:363 years ago, 3 Maltese students were arrested and charged with computer misuse after disclosing a vulnerability to a local company that developed a mobile app for students. Through persistent media pressure, the students managed to obtain a presidential pardon to drop the case and funding for their lawyers. However, through this journey, there were…
…
continue reading