System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Search for "kay" returned 3885 results
previous page
Sort by
Newest first
Oldest first
Relevance
next page
72 min
The Silicon Passion
MCH2022 Curated content
72 min
2022-07-22
134
SETUP
and
de Transmissie & Rodrigo Ferreira
May Contain Hackers 2022
44 min
Preach it don´t breach it -Cyber Security and Data Protection as partner in crime
Security
44 min
2023-06-10
99
Kerstin Böller
Gulaschprogrammiernacht 21
30 min
No Permissions Needed!
MCH2022 Curated content
30 min
2022-07-26
208
Aditi Bhatnagar
May Contain Hackers 2022
24 min
Introducing CSIRT.global: if you love the internet, we need your help
MCH2022 Curated content
24 min
2022-07-25
196
Eward Driehuis
May Contain Hackers 2022
45 min
Single Sign-On: A Hacker's Perspective
MCH2022 Curated content
45 min
2022-07-25
1.1k
Matthijs Melissen
May Contain Hackers 2022
50 min
macOS local security: escaping the sandbox and bypassing TCC
MCH2022 Curated content
50 min
2022-07-25
168
Thijs Alkemade
and
Daan Keuper
May Contain Hackers 2022
51 min
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry System
MCH2022 Curated content
51 min
2022-07-25
500
Martin Herfurt
May Contain Hackers 2022
50 min
Plotting the Pandemic...
or Any Other Catastrophe-Movie
MCH2022 Curated content
50 min
2022-07-25
79
Klaudia
May Contain Hackers 2022
36 min
PolyCoin - A game played across MCH
How it works and what is inside it
MCH2022 Curated content
36 min
2022-07-25
106
Michael Turner
May Contain Hackers 2022
38 min
drand: publicly verifiable randomness explained
MCH2022 Curated content
38 min
2022-07-25
142
Yolan Romailler
May Contain Hackers 2022
21 min
World in Vectors - Cross-platform Map Rendering using Rust
MCH2022 Curated content
21 min
2022-07-24
853
Max Ammann
May Contain Hackers 2022
48 min
Hacking COVID: Hackers helping the government
MCH2022 Curated content
48 min
2022-07-24
279
Brenno de Winter
and
Ron Roozendaal
May Contain Hackers 2022
18 min
IOT: International Outage Technology (Disclosure of DIVD-2022-00009)
MCH2022 Curated content
18 min
2022-07-24
896
Frank Breedijk
May Contain Hackers 2022
38 min
Electric Vehicles Are Going To Suck; Here's Why
MCH2022 Curated content
38 min
2022-07-24
7.9k
Jenny List
May Contain Hackers 2022
44 min
Running a mainframe on your laptop for fun and profit
MCH2022 Curated content
44 min
2022-07-24
413
Jeroen Baten
May Contain Hackers 2022
31 min
FreeSewing: sewing patterns based on code
MCH2022 Curated content
31 min
2022-07-23
202
Lexander
May Contain Hackers 2022
29 min
Reverse engineering the Albert Heijn app for fun and profit
MCH2022 Curated content
29 min
2022-07-23
2.1k
Nick Bouwhuis
May Contain Hackers 2022
28 min
Reclaiming our faces
MCH2022 Curated content
28 min
2022-07-23
223
kantorkel
,
Lotte Houwing - Bits of Freedom
and
e-punc
May Contain Hackers 2022
38 min
Honey, let's hack the kitchen:
Attacks on critical and not-so-critical cyber physical…
MCH2022 Curated content
38 min
2022-07-23
212
Daniel Kapellmann Zafra
May Contain Hackers 2022
42 min
Digital Civil Disobedience
MCH2022 Curated content
42 min
2022-07-23
305
Marleen
May Contain Hackers 2022
30 min
Everything is an input device (fun with barcodes)
MCH2022 Curated content
30 min
2022-07-23
5.4k
Muse
and
Jasper
May Contain Hackers 2022
45 min
Wired Norms: Inscription, resistance, and subversion in the governance of the Internet…
MCH2022 Curated content
45 min
2022-07-22
213
Niels ten Oever
May Contain Hackers 2022
48 min
Bring Your Own IDentity
MCH2022 Curated content
48 min
2022-07-22
236
Rick van Rein
and
Henri Manson
May Contain Hackers 2022
56 min
Educational initiatives and platforms on OpenStreetMap: making open data more accessible
Community and Foundation
OSM
56 min
2022-08-20
12
Michael Montani
State of the Map 2022
39 min
Using deployment diagrams to explain architecture and security to everybody
Wonderful creations
Cassiopeia
39 min
2025-08-11
111
Peter van Eijk
What Hackers Yearn 2025
previous page
next page