System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for SHA2017
webm
SD quality
mp4
SD quality
mp3
opus
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for SHA2017
webm
SD quality
mp4
SD quality
mp3
opus
browse
conferences
camp-NL
sha2017
playlist
Playlist "SHA2017: Still Hacking Anyway"
Video Player
▶
SHA2017 Badge
The Fenrir Project
Hack-a-ble
FaceDancer 2.0
Parkour communications
NSFW: Di[CENSORED]s for pri...
DDoS attack and defense
Exploiting Twitter with Tin...
Building A Virtual Reality ...
Energy Harvesting for Smart...
Commissioning methods for IoT
(In)discrete Music
"Information. What are they...
Let There be Light
Car hacking: getting from A...
How an intern hacked the po...
Black Hat Locksmithing
When Tech MIMICS Reality
The Hackeboy handheld game ...
Resisting Algorithms of Mas...
Life Needs Internet
In The Eye of the Beholder
The art of creating an esca...
Physical Penetration Testing
Weaponized Social
Legacy Crypto Never Dies
Neuralscape Bowels
Gems are truly outrageous
Race For Root: The Analysis...
Computer crime and criminal...
Cryptography beyond Encrypt...
Good is hard, but try anyway.
MISP threat sharing platform
Ethics in Technology
Let's stop EU copyright exp...
An academic's view to incid...
Lightning talks day 4
Responsible Disclosure; How...
Regulating Law Enforcement ...
Digital dissent in Latin Am...
One map to map them all
Ask your candidates and let...
Off Grid: Disclosing your 0...
Get your ass (HTTP infrastr...
Adventures in Spearphishing...
Hardware games
Ethics in Computing
Open networking and hardwar...
Nerd-Wrangling 101
Playing defence is complicated
On the design of a portable...
The quest for algorithm div...
I have a dream
From Project To Kit
Silent Protest
Blockchains for a Better World
Cryptowars 2.0: Lessons fro...
Hormones and Hysteria - wha...
FILMS
Cryptokids
SHOULD I STAY OR SHOULD I GO?
Certbot & Let's Encrypt Off...
GNU Taler
Anonymous, secure and easy....
Human Rights and Internet I...
Time Stretching BpmDj
Network Traffic Analysis us...
Malware: From your text edi...
The state of the pretty Eas...
Smart, safe & happy
Rooting the MikroTik routers
Social Enterprises as a Too...
Digital personal locker
How hackers could have hack...
Developments in Coordinated...
Build Usable Tools
We don’t need no security!
Building Businesses that we...
My Safe In Your House
A look at TR-06FAIL and oth...
Social cooling
Human body as an electric I...
Tor & Configuration Management
How I made my diesel motorc...
Because "use urandom" isn't...
The law and leaky abstractions
Data Exploitation
Lightning talks day 3
Hands up, don't shoot. Unle...
Flip Feng Shui
Olmogo - because it's your ...
Zanshin Tech: the digital m...
The World in 24 Hours Revis...
Decentralize! Self-hosting ...
Off<>zz Code and Piano Concert
Fermentation Mobile
Exploiting The North Americ...
Cut by the free and open edge
How to develop PyQt software
Bypassing Secure Boot using...
Demolish the web with the F...
Relationship status of tech...
Art Tech Activism Privacy a...
Computational Thinking
Best of IoT Fails
Zero to chiptune in one hour
Network concepts introducti...
Detecting a breach from an ...
Improving security with Fuz...
Lecture Decode: Data-sovere...
Smart Home Security with Tor
Beyond the Titanic
Hacking on a boat
Heralds Introduction
Are Whistleblowers safer to...
Hack North Korea
DNA: The Code of Life
Tor de-anonymization techni...
How to Defend Cars
Automotive microcontrollers...
Mass Surveillance abusing C...
Introducing Talla: An Erlan...
Mailpile
How the NSA tracks you
SHA2017 Opening
Famous C&C servers from ins...
from glass fiber to fiber g...
The Security and Privacy Im...
Moving towards fully encryp...
OpenINTEL: digging in the D...
Privacy Design Strategies
LDraw: computer-aided desig...
Building Humanitarian hacke...
A trip to India
Invitation to help build Qu...
Life is too short for playi...
TBM: Trusted boot module
Update the updates
Failure modes of digital ra...
Ethics and the Events of 9-11
Copyfighters
Mathematics and Video Games
Software Patents v3.0: the ...
15
30
00:00
00:00
|
00:00
Use Up/Down Arrow keys to increase or decrease volume.
1.00x
2.00x
1.50x
1.25x
1.00x
0.75x
SHA2017 Badge
Niek Blankers
and
Sebastius
The SHA2017 Badge overview.
#Making