Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Van de GHP tot why2025: De geschiedenis en toekomst van de nederlandse hackercamps (hackerhotel2025)
43:22
43:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:22De geschiedenis en toekomst van de nederlandse hackercampsKom mee door deze geschiedenis les ter voorbereiding van het jubuleum kamp, WHY2025!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/NCKS3X/Von Boekenwuurm
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Wat is data (hackerhotel2025)
15:30
15:30
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:30Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :)Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is.Wat is data?Hoe lang duurt een dag?Hoe lang duurt een uur?Hoe lang is een maand?Wat is een jaartal?Wat is een geboortedatum?Wat is een naam?Hoe lang is een pincode?Waaruit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Wat is data (hackerhotel2025)
15:30
15:30
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:30Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :)Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is.Wat is data?Hoe lang duurt een dag?Hoe lang duurt een uur?Hoe lang is een maand?Wat is een jaartal?Wat is een geboortedatum?Wat is een naam?Hoe lang is een pincode?Waaruit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Evolution and history of 33.333 years of Hardcore Music (hackerhotel2025)
1:05:31
1:05:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:05:31The summary that's fun for both outsiders and insiders of this gem of a genre. Talk is in Dutch :)I wanted to do another talk, but Hacker Hotel decided to sell branded bomber jacks, which forced my hand as this conference then also needs the talk that goes along with those jackets. During the talk we'll listen to the evolution of a genre using samp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Evolution and history of 33.333 years of Hardcore Music (hackerhotel2025)
1:05:31
1:05:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:05:31The summary that's fun for both outsiders and insiders of this gem of a genre. Talk is in Dutch :)I wanted to do another talk, but Hacker Hotel decided to sell branded bomber jacks, which forced my hand as this conference then also needs the talk that goes along with those jackets. During the talk we'll listen to the evolution of a genre using samp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Frank talks AI, keynote style (hackerhotel2025)
43:57
43:57
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:57Frank talks about AI, why it all of a sudden is everywhere and what it means.The keynotes of the likes of Microsoft, Google and Apple can all be summarized in 10 words: “A.I., A.I., A.I., Large Language Model, A.I., A.I., GPT, A.I. …“, so no doubt artificial intelligence holds a promise for the future. But what promise? Will A.I. save use or doom u…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Frank talks AI, keynote style (hackerhotel2025)
43:57
43:57
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:57Frank talks about AI, why it all of a sudden is everywhere and what it means.The keynotes of the likes of Microsoft, Google and Apple can all be summarized in 10 words: “A.I., A.I., A.I., Large Language Model, A.I., A.I., GPT, A.I. …“, so no doubt artificial intelligence holds a promise for the future. But what promise? Will A.I. save use or doom u…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
My stairs use 6 IP Addresses and run JavaScript (hackerhotel2025)
41:00
41:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
41:00I spent the past 6 years restoring and upgrading the 2 flights of stairs in my almost 100 years old house in my off time, taking into them into the 21st century while I was at it. The result is a standalone extensible system that supports an unlimited number of sensors and can light up to 256 cheap LED strips on a setup that can run completely off …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Don't Trust Us (hackerhotel2025)
30:32
30:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:32In The Netherlands, everyone can trust the outcome of elections. That is our mission as The Dutch electoral council.But you don't have to trust us to be able to trust the outcome of elections. Anyone can verify the results and in this presentation, we aim to explain to you which security measures have been taken in the election process here in The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
My stairs use 6 IP Addresses and run JavaScript (hackerhotel2025)
41:00
41:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
41:00I spent the past 6 years restoring and upgrading the 2 flights of stairs in my almost 100 years old house in my off time, taking into them into the 21st century while I was at it. The result is a standalone extensible system that supports an unlimited number of sensors and can light up to 256 cheap LED strips on a setup that can run completely off …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Don't Trust Us (hackerhotel2025)
30:32
30:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:32In The Netherlands, everyone can trust the outcome of elections. That is our mission as The Dutch electoral council.But you don't have to trust us to be able to trust the outcome of elections. Anyone can verify the results and in this presentation, we aim to explain to you which security measures have been taken in the election process here in The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Van de GHP tot why2025: De geschiedenis en toekomst van de nederlandse hackercamps (hackerhotel2025)
43:22
43:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:22De geschiedenis en toekomst van de nederlandse hackercampsKom mee door deze geschiedenis les ter voorbereiding van het jubuleum kamp, WHY2025!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/NCKS3X/Von Boekenwuurm
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Meshtastic Fantastic (hackerhotel2025)
38:31
38:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
38:31Meshtastic and LoRa, what is it and what can you do with it?LoRa, or Long Range radio, is a technology that operates on freely available frequency bands. Thanks to its unique way of transmitting and receiving signals, it’s not only remarkably resistant to noise but also capable of bridging impressive distances with very little power.One of the most…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Meshtastic Fantastic (hackerhotel2025)
38:31
38:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
38:31Meshtastic and LoRa, what is it and what can you do with it?LoRa, or Long Range radio, is a technology that operates on freely available frequency bands. Thanks to its unique way of transmitting and receiving signals, it’s not only remarkably resistant to noise but also capable of bridging impressive distances with very little power.One of the most…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tanmatsu/WHY2025 badge PCB design (hackerhotel2025)
48:42
48:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
48:42This talk delves into the technical aspects of the Tanmatsu hardware design, the latest creation by the badge team, set to be released alongside the availability of ESP32-P4 chips. It will also form the foundation for the WHY2025 badge. Topics include an exploration of the PCB's high-level design, cost considerations for producing 4000 units, chall…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tanmatsu/WHY2025 badge PCB design (hackerhotel2025)
48:42
48:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
48:42This talk delves into the technical aspects of the Tanmatsu hardware design, the latest creation by the badge team, set to be released alongside the availability of ESP32-P4 chips. It will also form the foundation for the WHY2025 badge. Topics include an exploration of the PCB's high-level design, cost considerations for producing 4000 units, chall…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Aid to Ukraine - with Roman from Kharkiv (hackerhotel2025)
55:35
55:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
55:35Since the start of the war, our community has risen to help friends in Ukraine in many different ways. Roman Kniaziev is coming over from Kharkiv to explain how he works with all the volunteers of ETOC to support his country. Even though the news can be overwhelming, everyone can help. This talk shows you how.The IT community in Kharkiv is doing th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What's that CubeSat Satellite stuff anyhow? (hackerhotel2025)
55:20
55:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
55:20CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Aid to Ukraine - with Roman from Kharkiv (hackerhotel2025)
55:35
55:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
55:35Since the start of the war, our community has risen to help friends in Ukraine in many different ways. Roman Kniaziev is coming over from Kharkiv to explain how he works with all the volunteers of ETOC to support his country. Even though the news can be overwhelming, everyone can help. This talk shows you how.The IT community in Kharkiv is doing th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What's that CubeSat Satellite stuff anyhow? (hackerhotel2025)
55:20
55:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
55:20CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dutch Fun! (damentals) (hackerhotel2025)
1:21:28
1:21:28
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:21:28This workshop is especially for all attendants who are not Dutch natives. In an exact and logical manner I will guide you through the syntax and semantics of the Dutch language, from sounds (the famous 'ggh' and vowel inventory) to gender of nouns and word order. There will be simple illustrations to help you get a grip on the language and bluff yo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to do vulnerability disclosure in Japan (hackerhotel2025)
25:23
25:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:23With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for DIVD. Japan’s governmental policy on CVD dates back to 2004. Although Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure, Japanese institutes help citizens disclo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dutch Fun! (damentals) (hackerhotel2025)
1:21:28
1:21:28
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:21:28This workshop is especially for all attendants who are not Dutch natives. In an exact and logical manner I will guide you through the syntax and semantics of the Dutch language, from sounds (the famous 'ggh' and vowel inventory) to gender of nouns and word order. There will be simple illustrations to help you get a grip on the language and bluff yo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Don’t judge a vulnerability by its CVSS score (hackerhotel2025)
27:32
27:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:32The total number of vulnerabilities continues to rise. If we had to rely on just CVSS for prioritizing those vulnerabilities, we have an enormous hard time to remediate all of them. In this talk, we’ll explore the critical gaps in CVSS-based prioritization and discuss why factors like exploitability, asset criticality, and real-time threat intellig…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to do vulnerability disclosure in Japan (hackerhotel2025)
25:23
25:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:23With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for DIVD. Japan’s governmental policy on CVD dates back to 2004. Although Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure, Japanese institutes help citizens disclo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Don’t judge a vulnerability by its CVSS score (hackerhotel2025)
27:32
27:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:32The total number of vulnerabilities continues to rise. If we had to rely on just CVSS for prioritizing those vulnerabilities, we have an enormous hard time to remediate all of them. In this talk, we’ll explore the critical gaps in CVSS-based prioritization and discuss why factors like exploitability, asset criticality, and real-time threat intellig…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
I love historical computing. to the moon and back (hackerhotel2025)
35:06
35:06
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:06This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) on board the Apollo missions that got us to the moon and back.I will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.Back in the period 1962 to 1969 the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Abacus - about the new software for the Dutch Elections (hackerhotel2025)
46:32
46:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:32The Election Council is working on Abacus, the tabulation software for the elections. Come to this workshop to try your hands on the software in a production-like setting and learn more about the choices and concepts behind it.The Election Council is working on Abacus, the tabulation software for the elections. This workshop will show you how it wo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AiTM: Lessons Learned (hackerhotel2025)
39:35
39:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
39:35"AiTM: Lessons Learned" dives into the evolving threat of AiTM attacks. Our presentation highlights the transition from basic phishing tactics to sophisticated methods that compromise organizational security. The presentation outlines the journey from oldschool phishing attacks, to phishing framework like UADMIN, and the introduction of tools like …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AiTM: Lessons Learned (hackerhotel2025)
39:35
39:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
39:35"AiTM: Lessons Learned" dives into the evolving threat of AiTM attacks. Our presentation highlights the transition from basic phishing tactics to sophisticated methods that compromise organizational security. The presentation outlines the journey from oldschool phishing attacks, to phishing framework like UADMIN, and the introduction of tools like …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Abacus - about the new software for the Dutch Elections (hackerhotel2025)
46:32
46:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:32The Election Council is working on Abacus, the tabulation software for the elections. Come to this workshop to try your hands on the software in a production-like setting and learn more about the choices and concepts behind it.The Election Council is working on Abacus, the tabulation software for the elections. This workshop will show you how it wo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
I love historical computing. to the moon and back (hackerhotel2025)
35:06
35:06
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:06This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) on board the Apollo missions that got us to the moon and back.I will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.Back in the period 1962 to 1969 the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Workshop loosing weight (hackerhotel2025)
1:00:51
1:00:51
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:00:51I have been struggling with my weight for over 25 years. After reading the book : The Obesity Code" everything clicked. Since I have lost 13 kg within 6 months. The great thing about this is that it is effortless.In this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual partic…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacking with screenreaders as tool or utility (hackerhotel2025)
51:57
51:57
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:57How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.Other topics are:* Reading and analysing logging* Capture a scrolling text* Query of classes etcLicensed to the public under http://creati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacking with screenreaders as tool or utility (hackerhotel2025)
51:57
51:57
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:57How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.Other topics are:* Reading and analysing logging* Capture a scrolling text* Query of classes etcLicensed to the public under http://creati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Workshop loosing weight (hackerhotel2025)
1:00:51
1:00:51
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:00:51I have been struggling with my weight for over 25 years. After reading the book : The Obesity Code" everything clicked. Since I have lost 13 kg within 6 months. The great thing about this is that it is effortless.In this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual partic…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
De validatiecrisis (hackerhotel2025)
51:32
51:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:32De opkomst van geavanceerde technologie en kunstmatige intelligentie heeft ongekende mogelijkheden gecreëerd, maar ook een sluimerend probleem blootgelegd: de validatiecrisis. In deze lezing neemt Brenno de Winter, gerenommeerd cybersecurity-expert en auteur van De Validatiecrisis, u mee in de wereld van misleidende aannames, ongeteste technologie,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
De validatiecrisis (hackerhotel2025)
51:32
51:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:32De opkomst van geavanceerde technologie en kunstmatige intelligentie heeft ongekende mogelijkheden gecreëerd, maar ook een sluimerend probleem blootgelegd: de validatiecrisis. In deze lezing neemt Brenno de Winter, gerenommeerd cybersecurity-expert en auteur van De Validatiecrisis, u mee in de wereld van misleidende aannames, ongeteste technologie,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ask me anything, with Huib Modderkolk (hackerhotel2025)
41:17
41:17
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
41:17This you really want to know. Huib has been responsibly disclosing the Secret Services, criminals and hackers. Now we turn it around: ask Huib anything. Chris van ‘t Hof will guide the conversation.Books: 2024 “Dit wil je echt niet weten”, 2019 “Het is oorlog en niemand die het ziet”, “There's a War Going On But No One Can See It” - Its war and eve…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ask me anything, with Huib Modderkolk (hackerhotel2025)
41:17
41:17
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
41:17This you really want to know. Huib has been responsibly disclosing the Secret Services, criminals and hackers. Now we turn it around: ask Huib anything. Chris van ‘t Hof will guide the conversation.Books: 2024 “Dit wil je echt niet weten”, 2019 “Het is oorlog en niemand die het ziet”, “There's a War Going On But No One Can See It” - Its war and eve…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Openingstalk Hackerhotel 2025 (hackerhotel2025)
1:05:47
1:05:47
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:05:47Openingstalk by Dimitri opening Hackerhotel 2025In this openingstalk i will open Hackerhotel 2025 and thank all people that helped me and explain about how this Hackerhotel 2025 organisation went.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/EMVMAX/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Openingstalk Hackerhotel 2025 (hackerhotel2025)
1:05:47
1:05:47
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:05:47Openingstalk by Dimitri opening Hackerhotel 2025In this openingstalk i will open Hackerhotel 2025 and thank all people that helped me and explain about how this Hackerhotel 2025 organisation went.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/EMVMAX/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Nerding out over silly machines (hackerhotel2025)
57:18
57:18
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
57:18You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Android Auto (Flitsmeister) (hackerhotel2025)
46:38
46:38
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:38How to make an Android App for Android Auto, a demo of the MapLibre sample app, and stories about Flitsmeister.FrankkieNL has worked on the Android Auto (and Automotive) version of the Flitsmeister app.This navigation app uses MapLibre to render a map on the Car screen.During this talk, we will discuss how this works and how you can create your own…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Automating incident response: scalable & fast, within minutes (hackerhotel2025)
50:34
50:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
50:34In today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in digital forensics, is no longer sufficient nor is it efficient enough. It's time for a shift towards an automated incident response strategy that com…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Nerding out over silly machines (hackerhotel2025)
57:18
57:18
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
57:18You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Android Auto (Flitsmeister) (hackerhotel2025)
46:38
46:38
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:38How to make an Android App for Android Auto, a demo of the MapLibre sample app, and stories about Flitsmeister.FrankkieNL has worked on the Android Auto (and Automotive) version of the Flitsmeister app.This navigation app uses MapLibre to render a map on the Car screen.During this talk, we will discuss how this works and how you can create your own…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Automating incident response: scalable & fast, within minutes (hackerhotel2025)
50:34
50:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
50:34In today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in digital forensics, is no longer sufficient nor is it efficient enough. It's time for a shift towards an automated incident response strategy that com…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OT Cyberchallenges 2 (hackerhotel2025)
59:27
59:27
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
59:27A year later, we are back at the wonderful company Acme where nice people make beautiful things.This time we will follow up on that and tell you how the company can improve their own maturity and security levels as explained in the standard.A year later, we are back at the wonderful company Acme where nice people make beautiful things. How did they…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Crypto 101 (hackerhotel2025)
54:14
54:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
54:14A short introduction to cryptography, its past, present and future for the not yet fully initiated.Many talks mentioned cryptography somewhere along the presentation and everybody just nods. But how many people actually know the insights of cryptography? Why some things work and some things don't? During this talk I will explain the difference betw…
…
continue reading