Channel Avatar

WHY2025 @UCHmPMdU0O9P_W6I1hNyvBIQ@youtube.com

8.5K subscribers - no pronouns :c

WHY2025 is the next big Dutch Hackercamp, also IFCAT event i


46:21
WHYcast Episode 27 - WHY2025 Podcast
29:41
WHYcast Episode 26 - WHY2025 Podcast
45:45
WHYcast Episode 25 - WHY2025 Podcast
28:48
WHYcast Episode 24 - WHY2025 Podcast
29:48
WHYcast Episode 23 - WHY2025 Podcast
36:51
WHYcast Episode 22 - WHY2025 Podcast
28:39
WHYcast Episode 21 - WHY2025 Podcast
41:28
WHYcast Episode 20 - WHY2025 Podcast
48:20
WHYcast Episode 19 - WHY2025 Podcast
58:13
WHYcast Episode 18 - WHY2025 Podcast
36:06
WHYcast Episode 17 - WHY2025 Podcast
23:26
WHYcast Episode 16 - WHY2025 Podcast
40:06
WHYcast Episode 15 - WHY2025 Podcast
39:27
WHYcast Episode 14 - WHY2025 Podcast
30:19
WHYcast Episode 13 - WHY2025 Podcast
31:54
WHYcast Episode 12 - WHY2025 Podcast
28:10
WHYcast Episode 11 - WHY2025 Podcast
33:21
WHYcast Episode 10 - WHY2025 Podcast
24:28
WHYcast Episode 9 - WHY2025 Podcast
20:35
WHYcast Episode 8 - WHY2025 Podcast
39:15
WHYcast Episode 7 - WHY2025 Podcast
22:55
WHYcast Episode 5 - WHY2025 Podcast
24:46
WHYcast Episode 4 - WHY2025 Podcast
00:02
Jick is on Fire! Hear what he has to say about it coming episode of the WHYcast 🔥🔥
45:23
WHYcast Episode 3 - WHY2025 Podcast
28:36
WHYcast Episode 2 - WHY2025 Podcast
29:33
WHYcast Episode 1 - WHY2025 Podcast
22:08
WHYcast Episode 0 - WHY2025 podcast
05:46
MCH2022 Aftermovie - May Contain Hackers
46:22
2022 - Ethics does not belong on the wall! Ethical framework for the use of location data
42:29
2022 - Digital Civil Disobedience
48:42
2022 - Sensor.Community - Global Open Environmental Data Platform
47:34
2022 - Rocking the Web Bloat: Modern Gopher, Gemini and the Small Internet
24:37
2022 - Introducing CSIRT.global: if you love the internet, we need your help
49:00
2022 - SSH Configuration, Intermediate Level
49:29
2022 - Censoring the internet & how to bypass it
47:17
2022 - How to Secure the Software Supply Chain
30:10
2022 - Where did all the parts go - the 202x component availability trashfire
33:41
2022 - Introduction to MQTT, Node-RED & Tasmota
43:02
2022 - hack your brain
58:22
2022 - Infrastructure review
22:37
2022 - Knock knock, who’s there? Is your door locked? Are you sure?
49:27
2022 - How do GPS/Galileo really work & how the galmon.eu monitors all navigation satellites
30:40
2022 - What can AI learn from your face? The making of HowNormalAmI.eu
17:47
2022 - ⚠️ May Contain Hackers 2022 Closing
30:15
2022 - No Permissions Needed!
53:40
2022 - Lightning Talks Tuesday
18:38
2022 - The MCH2022 Design
28:27
2022 - Cryptography is easy, but no magic. Use it. Wisely.
43:16
2022 - Computing within Limits
26:06
2022 - Guardians of the Dutch healthcare
33:35
2022 - What to do when someone close to you takes their life and you are not Tech-Savvy
44:16
2022 - Badge talk
44:02
2022 - OpenKAT: Looking at security with cat eyes
49:07
2022 - A CISO approach to pentesting; why so many reports are never used
48:49
2022 - A Smart Light Hacking Journey
01:32:12
2022 - Hope : It is too late to be pessimistic (about climate change)
50:49
2022 - macOS local security: escaping the sandbox and bypassing TCC
49:01
2022 - Scanning and reporting vulnerabilities for the whole IPv4 space. How the Dutch Institute for
49:24
2022 - Nuggets of Shannon Information Theory