cypherpunk

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

Veilid: A secure peer-to-peer network for apps that flips off the surveillance economy, created by Cult of the Dead Cow [DEFCON_31] (www.theregister.com)

DEF CON Infosec super-band the Cult of the Dead Cow has released Veilid (pronounced vay-lid), an open source project applications can use to connect up clients and transfer information in a peer-to-peer decentralized manner....

My Adventures as the World's Most Wanted Hacker | Kevin Mitnick | Talks at Google [52:11] (youtu.be)

Kevin Mitnick (RIP) visits Google’s NYC office to discuss his book “Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker” with Eran Feigenbaum, Google’s Director of Security for Google Apps. This event took place on August 17, 2011, as part of the Authors@Google series....

Cypherpunks Write Code (youtu.be)

In the early 1990s, a group of mathematicians, misfits, hackers, and hobbyists calling themselves “the cypherpunks” came together around a shared belief that the internet would either demolish society’s artificial walls or lay the groundwork for an Orwellian state. They saw cryptography as a weapon against central planning...

Hackers Testifying at the United States Senate, May 19, 1998 (L0pht Heavy Industries) (www.youtube.com)

L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998. Starring Brian Oblivion, Kingpin (Joe Grand), Tan, Space Rogue, Weld Pond, Mudge, and Stefan von Neumann....

LoRa Off-Grid Mesh Communication: Meshtastic (ESP32, BLE, GPS) (youtu.be)

Cool projects are rare. Here I found one I want to show to you. An off-grid personal communicator. It includes a lot of new technologies: ESP32, Smartphones, LoRa, BLE, GPS, Mesh, and as you see, 3D printing. And it solves a problem that could be seen as a human right: Personal SMS style communication everywhere in the world,...

Quantum Key Distribution and the Future of Encryption [27:05] (youtu.be)

Quantum computing will bring tumultuous change to the world of information security in the coming decade. As multi-qubit systems use quantum algorithms to slice through even 4096-bit PK encryption in seconds, new Quantum Encryption will be required to ensure data security. Join Konstantinos for a look at real world experiments...

Flipper Zero - A Hackers Review [16:44] (youtu.be)

The Ace has returned with yet another Cyber Tech Tool review! Today we look at the Flipper Zero, a portable multi-tool for pentesters and hardware geeks that comes in the form of a tamagotchi. This hardware opens up the world of radio protocols, access control systems, hardware, and more to what was previously a niche security...

Confessions of An Economic Hit Man | John Perkins | TEDxTraverseCity [18:35] (youtu.be)

John Perkins describes the methods he used to bribe and threaten the heads of state of countries on four continents in order to create a global empire and he reveals how the leaders who did not “play the game" were assassinated or overthrown. He brings us up to date about the way the economic hit man system has spread from...

Was YOUR vote counted? (feat. homomorphic encryption) - Numberphile (youtu.be)

In this report, we examine the future of voting and the possibility of conducting secure elections online. Specifically, we explore whether End-to-End Verifiable Internet Voting (E2E-VIV) systems are a viable and responsible alternative to traditional election systems....

  • All
  • Subscribed
  • Moderated
  • Favorites
  • cypherpunk@infosec.pub
  • DreamBathrooms
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • mdbf
  • tacticalgear
  • JUstTest
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • megavids
  • lostlight
  • All magazines